-
1
-
-
84903698216
-
-
Dec
-
Google Play. Dec. 2013. URL: https://play.google.com/store
-
(2013)
-
-
-
2
-
-
84860660623
-
Unsafe exposure analysis of mobile in-app advertisements
-
April, ACM
-
Grace, M. C., Zhou, W., Jiang, X., & Sadeghi, A. R. (2012, April). Unsafe exposure analysis of mobile in-app advertisements. In Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks (pp. 101-112). ACM.
-
(2012)
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks
, pp. 101-112
-
-
Grace, M.C.1
Zhou, W.2
Jiang, X.3
Sadeghi, A.R.4
-
3
-
-
84903733085
-
Investigating user privacy in android ad libraries
-
May
-
Stevens, R., Gibler, C., Crussell, J., Erickson, J., & Chen, H. (2012, May). Investigating user privacy in android ad libraries. In Workshop on Mobile Security Technologies (MoST).
-
(2012)
Workshop on Mobile Security Technologies (MoST)
-
-
Stevens, R.1
Gibler, C.2
Crussell, J.3
Erickson, J.4
Chen, H.5
-
5
-
-
84871959049
-
Addroid: Privilege separation for applications and advertisers in android
-
May, ACM
-
Pearce, P., Felt, A. P., Nunez, G., & Wagner, D. (2012, May). Addroid: Privilege separation for applications and advertisers in android. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (pp. 71-72). ACM.
-
(2012)
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
, pp. 71-72
-
-
Pearce, P.1
Felt, A.P.2
Nunez, G.3
Wagner, D.4
-
6
-
-
84875599330
-
Understanding mobile app usage patterns using in-app advertisements
-
January, Springer Berlin Heidelberg
-
Tongaonkar, A., Dai, S., Nucci, A., & Song, D. (2013, January). Understanding mobile app usage patterns using in-app advertisements. In Passive and Active Measurement (pp. 63-72). Springer Berlin Heidelberg.
-
(2013)
Passive and Active Measurement
, pp. 63-72
-
-
Tongaonkar, A.1
Dai, S.2
Nucci, A.3
Song, D.4
-
8
-
-
84881131952
-
AdRob: Examining the landscape and impact of android application plagiarism
-
Gibler, C., Stevens, R., Crussell, J., Chen, H., Zang, H., & Choi, H. (2013). AdRob: Examining the Landscape and Impact of Android Application Plagiarism. In Proceedings of 11th International Conference on Mobile Systems, Applications and Services.
-
(2013)
Proceedings of 11th International Conference on Mobile Systems, Applications and Services
-
-
Gibler, C.1
Stevens, R.2
Crussell, J.3
Chen, H.4
Zang, H.5
Choi, H.6
-
9
-
-
84903715462
-
-
Dec
-
apktool. Dec. 2013. URL: https://code.google.com/p/android-apktool
-
(2013)
Apktool
-
-
-
10
-
-
84903693372
-
-
Dec
-
baksmali disassembler. Dec. 2013. URL: https://code.google.com/p/smali
-
(2013)
Baksmali Disassembler
-
-
-
11
-
-
84890041396
-
-
Dec
-
Androguard. Dec. 2013. URL: https://code.google.com/p/androguard
-
(2013)
Androguard
-
-
-
12
-
-
84874828789
-
Fast, scalable detection of piggybacked mobile applications
-
February, ACM
-
Zhou, W., Zhou, Y., Grace, M., Jiang, X., & Zou, S. (2013, February). Fast, scalable detection of Piggybacked mobile applications. In Proceedings of the third ACM conference on Data and application security and privacy (pp. 185-196). ACM.
-
(2013)
Proceedings of the Third ACM Conference on Data and Application Security and Privacy
, pp. 185-196
-
-
Zhou, W.1
Zhou, Y.2
Grace, M.3
Jiang, X.4
Zou, S.5
-
14
-
-
84869388345
-
Pscout: Analyzing the android permission specification
-
October, ACM
-
Au, K. W. Y., Zhou, Y. F., Huang, Z., & Lie, D. (2012, October). Pscout: analyzing the android permission specification. In Proceedings of the 2012 ACM conference on Computer and communications security (pp. 217-228). ACM.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 217-228
-
-
Au, K.W.Y.1
Zhou, Y.F.2
Huang, Z.3
Lie, D.4
-
15
-
-
76749092270
-
The weka data mining software: An update
-
Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., and Witten, I. H. (2009). The WEKA data mining software: an update. ACM SIGKDD Explorations Newsletter 11, No 1, pp. 10-18.
-
(2009)
ACM SIGKDD Explorations Newsletter
, vol.11
, Issue.1
, pp. 10-18
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.H.6
-
16
-
-
0346586663
-
SMOTE: Synthetic minority over-sampling technique
-
N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer. (2002). SMOTE: Synthetic Minority Over-sampling Technique. Journal of Artificial Intelligence Research, 16: 321-357.
-
(2002)
Journal of Artificial Intelligence Research
, vol.16
, pp. 321-357
-
-
Chawla, N.V.1
Bowyer, K.W.2
Hall, L.O.3
Kegelmeyer, W.P.4
-
17
-
-
84903694563
-
-
Dec
-
Apperhand ad library threat. Dec. 2013. URL: urlhttp:// www.symantec.com/security response/writeup.jsp?docid=2012-012709-4046- 99&tabid=2
-
(2013)
Apperhand Ad Library Threat
-
-
|