-
1
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets
-
Feb.
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets. In Proceedings of the 19th Annual Network & Distributed System Security Symposium, Feb. 2012.
-
(2012)
Proceedings of the 19th Annual Network & Distributed System Security Symposium
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
-
5
-
-
84897736719
-
-
March 2010
-
A. Sami, H. Rahimi, B. Yadegar, N. Peiravian, S. Hashemi, A. Hamze, Malware Detection Based On Mining API Calls The 25th ACM Symposium on Applied Computing-Data Mining Track, March 2010.
-
Malware Detection Based on Mining API Calls the 25th ACM Symposium on Applied Computing-Data Mining Track
-
-
Sami, A.1
Rahimi, H.2
Yadegar, B.3
Peiravian, N.4
Hashemi, S.5
Hamze, A.6
-
6
-
-
33744584654
-
Induction of decision trees
-
J. Quinlan, Induction of decision trees. Machine learning, vol. 1, no. 1, pp. 81106, 1986.
-
(1986)
Machine Learning
, vol.1
, Issue.1
, pp. 81106
-
-
Quinlan, J.1
-
8
-
-
84856225193
-
Andromaly: A behavioral malware detection framework for android devices J
-
A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss, andromaly: A behavioral malware detection framework for android devices J. Intell. Inf. Syst., 38(1):161190, 2012.
-
(2012)
Intell. Inf. Syst.
, vol.38
, Issue.1
, pp. 161190
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
Glezer, C.4
Weiss, Y.5
-
10
-
-
0030211964
-
Bagging predictors
-
Breiman, L. Bagging Predictors , Machine Learning 26, No. 2, [1996]
-
(1996)
Machine Learning
, vol.26
, Issue.2
-
-
Breiman, L.1
-
15
-
-
27144531570
-
A study of the behavior of several methods for balancing machine learning training data
-
G. Batista, R. Prati, and M. Monard. A study of the behavior of several methods for balancing machine learning training data. ACM SIGKDD Explorations Newsletter, 2004
-
(2004)
ACM SIGKDD Explorations Newsletter
-
-
Batista, G.1
Prati, R.2
Monard, M.3
-
18
-
-
2342663706
-
Virus detection using data mining techniques
-
J. Wang, P. Deng, Y. Fan, L. Jaw, and Y. Liu, Virus detection using data mining techniques. In Proceedings of IEEE International Conference on Data Mining, 2003.
-
(2003)
Proceedings of IEEE International Conference on Data Mining
-
-
Wang, J.1
Deng, P.2
Fan, Y.3
Jaw, L.4
Liu, Y.5
-
20
-
-
84860281488
-
RobotDroid: A lightweight Ma lware Detection Framework on Smartphones
-
April 2012
-
M. Zhao, T. Zhang, F Ge and Z. Yuan, RobotDroid: A lightweight Ma lware Detection Framework on Smartphones, In Journal of Netwroks, Vol. 7, No. 4, April 2012.
-
Journal of Netwroks
, vol.7
, Issue.4
-
-
Zhao, M.1
Zhang, T.2
Ge, F.3
Yuan, Z.4
-
21
-
-
84897736717
-
-
CNet report
-
CNet report, Google Android application number. http://news.cnet.com/ 8301-1035 3-57521252-94/can-apples-app-storemaintain-its-lead-over-google-play/
-
Google Android Application Number
-
-
-
22
-
-
59849105307
-
VEye: Behavioral footprinting for self-propagating worm detection and profiling
-
X. Jiang and X. Zhu, vEye: Behavioral footprinting for self-propagating worm detection and profiling, Knowledge and Information Systems, 18(2):231-262, 2009.
-
(2009)
Knowledge and Information Systems
, vol.18
, Issue.2
, pp. 231-262
-
-
Jiang, X.1
Zhu, X.2
|