-
1
-
-
0032786569
-
Improving support vector machine classifiers by modifying kernel functions
-
Amari, S. and S. Wu. "Improving Support Vector Machine Classifiers by Modifying Kernel Functions." Neural Networks 12, no. 6 (1999): 783-89.
-
(1999)
Neural Networks
, vol.12
, Issue.6
, pp. 783-789
-
-
Amari, S.1
Wu, S.2
-
2
-
-
84887861619
-
-
(accessed 23 July 2013)
-
Android Developers. 2013a. Manifest.permission j Android Developers. Available at: http://developer.android.com/reference/android/Manifest. permission.html (accessed 23 July 2013).
-
(2013)
Manifest.Permission J Android Developers
-
-
-
3
-
-
84887987713
-
-
(accessed 23 July 2013)
-
Android Developers. 2013b. j Android Developers. Available at: http://developer.android.com/guide/topics/manifest/uses-feature- element.html (accessed 23 July 2013).
-
(2013)
J Android Developers
-
-
-
4
-
-
84887987713
-
-
(accessed 23 July 2013)
-
Android Developers. 2013c. j Android Developers. Available at: http://developer.android.com/guide/topics/manifest/uses- permission-element. html (accessed 23 July 2013).
-
(2013)
J Android Developers
-
-
-
5
-
-
84887961844
-
-
Android-market-api, (accessed 23 July 2013)
-
Android-market-api. 2013. Android Market for all developers! Google Project Hosting. Available at: https://code.google.com/p/android-market-api/ (accessed 23 July 2013).
-
(2013)
Android Market for All Developers! Google Project Hosting
-
-
-
7
-
-
78651410113
-
An android application sandbox system for suspicious software detection
-
October 19-20
-
Blasing, T., L. Batyuk, A. D. Schmidt, S. A. Camtepe, and S. Albayrak. "An Android Application Sandbox System for Suspicious Software Detection." 2010 5th IEEE International Conference on Malicious and Unwanted Software (MALWARE), Nancy, France, October 19-20, 2010.
-
(2010)
2010 5th IEEE International Conference on Malicious and Unwanted Software (MALWARE), Nancy, France
-
-
Blasing, T.1
Batyuk, L.2
Schmidt, A.D.3
Camtepe, S.A.4
Albayrak, S.5
-
8
-
-
0035478854
-
Random forests
-
Breiman, L. "Random Forests." Machine Learning 45, no. 1 (2001): 5-32.
-
(2001)
Machine Learning
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
9
-
-
80755143401
-
Crowdroid: Behavior-based malware detection system for android
-
October 17-21
-
Burguera, I., U. Zurutuza, and S. Nadjm-Tehrani. "Crowdroid: Behavior-Based Malware Detection System for Android." Paper presented at the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Chicago, IL, October 17-21, 2011.
-
(2011)
1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Chicago, IL
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-Tehrani, S.3
-
11
-
-
78649820620
-
Automatic behaviour-based analysis and classification system for malware detection
-
June 8-12
-
Devesa, J., I. Santos, X. Cantero, Y. K. Penya, and P. G. Bringas. "Automatic Behaviour-Based Analysis and Classification System for Malware Detection." Paper presented at the 12th International Conference on Enterprise Information Systems (ICEIS), Madeira, Portugal, June 8-12, 2010.
-
(2010)
12th International Conference on Enterprise Information Systems (ICEIS), Madeira, Portugal
-
-
Devesa, J.1
Santos, I.2
Cantero, X.3
Penya, Y.K.4
Bringas, P.G.5
-
13
-
-
84887973284
-
-
Federal Communications Commission (FCC) (accessed 23 July 2013)
-
Federal Communications Commission (FCC). 2013. "Letter to Apple regarding Google Voice and related iPhone applications." Available at: http://www.fcc.gov/document/letter-apple-regarding-google-voice-and-related- iphone-applications (accessed 23 July 2013).
-
(2013)
Letter to Apple Regarding Google Voice and Related IPhone Applications
-
-
-
16
-
-
85164392958
-
A study of cross-validation and bootstrap for accuracy estimation and model selection
-
Kohavi, R. "A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection." International Joint Conference on Artificial Intelligence 14, (1995): 1137-45.
-
(1995)
International Joint Conference on Artificial Intelligence
, vol.14
, pp. 1137-1145
-
-
Kohavi, R.1
-
17
-
-
84894492335
-
-
(accessed 23 July 2013)
-
Lookout Mobile Security. 2013. Available at: https://www.lookout.com/ resources/reports/mobile-threat-report (accessed 23 July 2013).
-
(2013)
Lookout Mobile Security
-
-
-
18
-
-
84868107162
-
-
Summercon 2012, Brooklyn, NY, June 8-10
-
Oberheide, J. and J. Miller. Dissecting the Android Bouncer. Summercon 2012, Brooklyn, NY, June 8-10, 2012.
-
(2012)
Dissecting the Android Bouncer
-
-
Oberheide, J.1
Miller, J.2
-
20
-
-
84869432690
-
Using probabilistic generative models for ranking risks of android apps
-
October 16-18
-
Peng, H., C. Gates, B. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, and I. Molloy. "Using Probabilistic Generative Models for Ranking Risks of Android Apps." Paper presented at the 19th ACM Conference on Computer and Communications Security, Raleigh, NC, October 16-18, 2012.
-
(2012)
19th ACM Conference on Computer and Communications Security, Raleigh, NC
-
-
Peng, H.1
Gates, C.2
Sarma, B.3
Li, N.4
Qi, Y.5
Potharaju, R.6
Nita-Rotaru, C.7
Molloy, I.8
-
21
-
-
33744584654
-
Induction of decision trees
-
Quinlan, J. R. "Induction of Decision Trees." Machine Learning 1, no. 1 (1986): 81-106.
-
(1986)
Machine Learning
, vol.1
, Issue.1
, pp. 81-106
-
-
Quinlan, J.R.1
-
23
-
-
70450279044
-
Learning and classification of malware behavior
-
July 10-11
-
Rieck, K., T. Holz, C. Willems, P. Düssel, and P. Laskov. "Learning and Classification of Malware Behavior." Paper presented at 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008.
-
(2008)
5th International Conference, DIMVA 2008, Paris, France
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Düssel, P.4
Laskov, P.5
-
24
-
-
84874105145
-
Opcode sequences as representation of executables for data-mining-based unknown malware detection
-
Santos, I., F. Brezo, X. Ugarte-Pedrero, and P. García Bringas. "Opcode Sequences as Representation of Executables for Data-Mining-Based Unknown Malware Detection." Information Sciences 231 (2011): 64-82.
-
(2011)
Information Sciences
, vol.231
, pp. 64-82
-
-
Santos, I.1
Brezo, F.2
Ugarte-Pedrero, X.3
García Bringas, P.4
-
25
-
-
80052494221
-
Collective classification for unknown malware detection
-
July 18-21
-
Santos, I., C. Laorden, and P. G. Bringas. "Collective Classification for Unknown Malware Detection." Paper presented at the 6th International Conference on Security and Cryptography (SECRYPT), Seville, Spain, July 18-21, 2011.
-
(2011)
6th International Conference on Security and Cryptography (SECRYPT), Seville, Spain
-
-
Santos, I.1
Laorden, C.2
Bringas, P.G.3
-
26
-
-
80052977357
-
Semi-supervised learning for unknown malware detection
-
University of Salamanca, Spain, April 6-8
-
Santos, I., J. Nieves, and P. G. Bringas. "Semi-supervised Learning for Unknown Malware Detection." Paper presented at the 4th International Symposium on Distributed Computing and Artificial Intelligence (DCAI) and 9th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS), University of Salamanca, Spain, April 6-8, 2011.
-
(2011)
4th International Symposium on Distributed Computing and Artificial Intelligence (DCAI) and 9th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS)
-
-
Santos, I.1
Nieves, J.2
Bringas, P.G.3
-
27
-
-
84887880609
-
Static smartphone malware detection
-
September 7-9
-
Schmidt, A. D., A. Camtepe, and S. Albayrak. "Static Smartphone Malware Detection." Paper presented at the 5th Security Research Conference (Future Security 2010), Berlin, Germany, September 7-9, 2010.
-
(2010)
5th Security Research Conference (Future Security 2010), Berlin, Germany
-
-
Schmidt, A.D.1
Camtepe, A.2
Albayrak, S.3
-
28
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
May 14-16
-
Schultz, M. G., E. Eskin, F. Zadok, and S. J. Stolfo. "Data Mining Methods for Detection of New Malicious Executables." Paper presented at the 2001 IEEE Symposium on Security and Privacy, Oakland, CA, May 14-16, 2001.
-
(2001)
2001 IEEE Symposium on Security and Privacy, Oakland, CA
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, F.3
Stolfo, S.J.4
-
30
-
-
79951646815
-
Automated static code analysis for classifying android applications using machine learning
-
December 11-14
-
Shabtai, A., Y. Fledel, and Y. Elovici. "Automated Static Code Analysis for Classifying Android Applications Using Machine Learning." Paper presented at the 2010 International Conference on Computational Intelligence and Security, Nanning, Guangxi Zhuang Autonomous Region, China, December 11-14, 2010.
-
(2010)
2010 International Conference on Computational Intelligence and Security, Nanning, Guangxi Zhuang Autonomous Region, China
-
-
Shabtai, A.1
Fledel, Y.2
Elovici, Y.3
-
31
-
-
67650330214
-
Comparative analysis of regression and machine learning methods for predicting fault proneness models
-
Singh, Y., A. Kaur, and R. Malhotra. "Comparative Analysis of Regression and Machine Learning Methods for Predicting Fault Proneness Models." International Journal of Computer Applications in Technology 35, no. 2 (2009): 183-93.
-
(2009)
International Journal of Computer Applications in Technology
, vol.35
, Issue.2
, pp. 183-193
-
-
Singh, Y.1
Kaur, A.2
Malhotra, R.3
-
32
-
-
77950115244
-
An automated classification system based on the strings of trojan and virus families
-
October 13-14
-
Tian, R., L. Batten, R. Islam, and S. Versteeg. "An Automated Classification System Based on the Strings of Trojan and Virus Families." 2009 4th International Conference on Malicious and Unwanted Software (MALWARE), Montréal, Quebec, Canada, October 13-14, 2009.
-
(2009)
2009 4th International Conference on Malicious and Unwanted Software (MALWARE), Montréal, Quebec, Canada
-
-
Tian, R.1
Batten, L.2
Islam, R.3
Versteeg, S.4
|