-
1
-
-
85184290714
-
-
Android statistics, 2013. URL http://www.appbrain.com/stats/number-of- android-apps.
-
(2013)
Android Statistics
-
-
-
4
-
-
0033359493
-
Experiments with clustering as a software remodularization method
-
(Washington, DC, USA), IEEE Computer Society
-
N. Anquetil, C. Fourrier, and T. C. Lethbridge. Experiments with clustering as a software remodularization method. In WCRE'99: Proceedings of the Sixth Working Conference on Reverse Engineering (Washington, DC, USA), IEEE Computer Society, page 235, 1999.
-
(1999)
WCRE'99: Proceedings of the Sixth Working Conference on Reverse Engineering
, pp. 235
-
-
Anquetil, N.1
Fourrier, C.2
Lethbridge, T.C.3
-
5
-
-
85184291180
-
-
Oct.
-
M. Ballano. Android malware, Oct. 2012. URL http://www.itu.int/ITU-D/eur/ rf/cybersecurity/presentations/symantec-itu\-mobile.pdf.
-
(2012)
Android Malware
-
-
Ballano, M.1
-
9
-
-
0000354976
-
A comparative study of ordinary cross-validation, v-fold cross-validation and the repeated learning-testing methods
-
P. Burman. A comparative study of ordinary cross-validation, v-fold cross-validation and the repeated learning-testing methods. Biometrika, 76(3):503-514, 1989.
-
(1989)
Biometrika
, vol.76
, Issue.3
, pp. 503-514
-
-
Burman, P.1
-
10
-
-
33847141351
-
Efficient plagiarism detection for large code repositories
-
S. Burrows, S. M. Tahaghoghi, and J. Zobel. Efficient plagiarism detection for large code repositories. Software: Practice and Experience, 37(2):151-175, 2007.
-
(2007)
Software: Practice and Experience
, vol.37
, Issue.2
, pp. 151-175
-
-
Burrows, S.1
Tahaghoghi, S.M.2
Zobel, J.3
-
11
-
-
84879543890
-
Mast: Triage for market-scale mobile malware analysis
-
ACM
-
S. Chakradeo, B. Reaves, P. Traynor, and W. Enck. Mast: Triage for market-scale mobile malware analysis. In Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, pages 13-24. ACM, 2013.
-
(2013)
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks
, pp. 13-24
-
-
Chakradeo, S.1
Reaves, B.2
Traynor, P.3
Enck, W.4
-
12
-
-
27544433210
-
Semantics-aware malware detection
-
IEEE
-
M. Christodorescu, S. Jha, S. A. Seshia, D. Song, and R. E. Bryant. Semantics-aware malware detection. In Security and Privacy, 2005 IEEE Symposium on, pages 32-46. IEEE, 2005.
-
(2005)
Security and Privacy, 2005 IEEE Symposium on
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
13
-
-
0023294949
-
Computer viruses: Theory and experiments
-
F. Cohen. Computer viruses: Theory and experiments. Computers & security, 6(1):22-35, 1987.
-
(1987)
Computers & Security
, vol.6
, Issue.1
, pp. 22-35
-
-
Cohen, F.1
-
14
-
-
84865590234
-
Attack of the clones: Detecting cloned applications on android markets
-
Springer
-
J. Crussell, C. Gibler, and H. Chen. Attack of the clones: Detecting cloned applications on android markets. In Computer Security- ESORICS 2012, pages 37-54. Springer, 2012.
-
(2012)
Computer Security- ESORICS 2012
, pp. 37-54
-
-
Crussell, J.1
Gibler, C.2
Chen, H.3
-
15
-
-
84877983602
-
Android: From reversing to decompilation
-
A. Desnos and G. Gueguen. Android: From reversing to decompilation. Proc. of Black Hat Abu Dhabi, 2011. URL http://code.google.com/p/androguard/.
-
(2011)
Proc. of Black Hat Abu Dhabi
-
-
Desnos, A.1
Gueguen, G.2
-
17
-
-
0004161991
-
-
Prentice- Hall Advanced Reference Series. Prentice Hall PTR, ISBN 9780130222787. URL
-
A. Jain and R. Dubes. Algorithms for clustering data. Prentice- Hall Advanced Reference Series. Prentice Hall PTR, 1988. ISBN 9780130222787. URL http://books.google.com/books?id=7eBQAAAAMAAJ.
-
(1988)
Algorithms for Clustering Data
-
-
Jain, A.1
Dubes, R.2
-
18
-
-
80255126150
-
Malware classification based on call graph clustering
-
J. Kinable and O. Kostakis. Malware classification based on call graph clustering. Journal in Computer Virology, 7(4):233-245, 2011.
-
(2011)
Journal in Computer Virology
, vol.7
, Issue.4
, pp. 233-245
-
-
Kinable, J.1
Kostakis, O.2
-
22
-
-
64549135034
-
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
-
C. K. Roy, J. R. Cordy, and R. Koschke. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Science of Computer Programming, 74(7):470-495, 2009.
-
(2009)
Science of Computer Programming
, vol.74
, Issue.7
, pp. 470-495
-
-
Roy, C.K.1
Cordy, J.R.2
Koschke, R.3
-
23
-
-
84893920335
-
Code protection in android
-
P. Schulz. Code protection in android. Technical report, University of Bonn, 2012. URL http://net.cs.uni-bonn.de/fileadmin/user\-upload/plohmann/2012- Schulz-Code\-Protection\-in\-Android.pdf.
-
(2012)
Technical Report, University of Bonn
-
-
Schulz, P.1
-
24
-
-
77950675112
-
Google android: A comprehensive security assessment
-
ISSN 1540-7993
-
A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, and C. Glezer. Google android: A comprehensive security assessment. IEEE Security Privacy, 8(2):35-44, 2010. ISSN 1540-7993. .
-
(2010)
IEEE Security Privacy
, vol.8
, Issue.2
, pp. 35-44
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
Glezer, C.6
-
25
-
-
85084161115
-
All your droid are belong to us: A survey of current android attacks
-
San Francisco, CA, USENIX Association
-
T. Vidas, D. Votipka, and N. Christin. All your droid are belong to us: A survey of current android attacks. In Proceedings of the 5th USENIX conference on Offensive technologies, page 1019, San Francisco, CA, 2011. USENIX Association.
-
(2011)
Proceedings of the 5th USENIX Conference on Offensive Technologies
, pp. 1019
-
-
Vidas, T.1
Votipka, D.2
Christin, N.3
-
26
-
-
67651224123
-
The software similarity problem in malware analysis
-
R. Koschke, E. Merlo, and A. Walenstein, editors, number 06301 in Dagstuhl Seminar Proceedings
-
A. Walenstein and A. Lakhotia. The software similarity problem in malware analysis. In R. Koschke, E. Merlo, and A. Walenstein, editors, Duplication, Redundancy, and Similarity in Software, number 06301 in Dagstuhl Seminar Proceedings, 2007.
-
(2007)
Duplication, Redundancy, and Similarity in Software
-
-
Walenstein, A.1
Lakhotia, A.2
-
27
-
-
34548747253
-
The second international workshop on detection of software clones: Workshop report
-
A.Walenstein, A. Lakhotia, and R. Koschke. The second international workshop on detection of software clones: Workshop report. ACM SIGSOFT Software Engineering Notes, 29(2):1-5, 2004.
-
(2004)
ACM SIGSOFT Software Engineering Notes
, vol.29
, Issue.2
, pp. 1-5
-
-
Walenstein, A.1
Lakhotia, A.2
Koschke, R.3
-
29
-
-
84868259476
-
Droidmat: Android malware detection through manifest and API calls tracing
-
IEEE
-
D.-J. Wu, C.-H. Mao, T.-E. Wei, H.-M. Lee, and K.-P. Wu. Droidmat: Android malware detection through manifest and api calls tracing. In Information Security (Asia JCIS), 2012 Seventh Asia Joint Conference on, pages 62-69. IEEE, 2012.
-
(2012)
Information Security (Asia JCIS), 2012 Seventh Asia Joint Conference on
, pp. 62-69
-
-
Wu, D.-J.1
Mao, C.-H.2
Wei, T.-E.3
Lee, H.-M.4
Wu, K.-P.5
-
30
-
-
36849096063
-
Intelligent malware detection system
-
New York, NY, USA, ACM. ISBN 978-1-59593- 609-7
-
thACM SIGKDD international conference on Knowledge discovery and data mining, KDD '07, pages 1043-1047, New York, NY, USA, 2007. ACM. ISBN 978-1-59593- 609-7. .
-
(2007)
thACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '07
, pp. 1043-1047
-
-
Ye, Y.1
Wang, D.2
Li, T.3
Ye Imds, D.4
-
31
-
-
0027188633
-
Data structures and algorithms for nearest neighbor search in general metric spaces
-
Society for Industrial and Applied Mathematics
-
P. N. Yianilos. Data structures and algorithms for nearest neighbor search in general metric spaces. In Proceedings of the fourth annual ACM-SIAM Symposium on Discrete algorithms, pages 311-321. Society for Industrial and Applied Mathematics, 1993.
-
(1993)
Proceedings of the Fourth Annual ACM-SIAM Symposium on Discrete Algorithms
, pp. 311-321
-
-
Yianilos, P.N.1
-
32
-
-
84893446426
-
Droidanalytics: A signature based analytic system to collect, extract, analyze and associate android malware
-
Melbourne, Australia, July 2013
-
thIEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 13), Melbourne, Australia, July 2013., 2013.
-
(2013)
thIEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 13)
-
-
Zheng, M.1
Sun, M.2
Lui, J.3
-
33
-
-
84874828789
-
Fast, scalable detection of piggybacked mobile applications
-
W. Zhou, Y. Zhou, M. Grace, X. Jiang, and S. Zou. Fast, scalable detection of piggybacked mobile applications. In Proceedings of the third ACM conference on Data and application security and privacy, page 185196, 2013.
-
(2013)
Proceedings of the Third ACM Conference on Data and Application Security and Privacy
, pp. 185196
-
-
Zhou, W.1
Zhou, Y.2
Grace, M.3
Jiang, X.4
Zou, S.5
|