메뉴 건너뛰기




Volumn , Issue , 2014, Pages 142-148

A two-layered permission-based android malware detection scheme

Author keywords

Android permission; Machine learning; Malware detection

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER CRIME; DETECTORS; LEARNING SYSTEMS; MALWARE; MOBILE CLOUD COMPUTING;

EID: 84903824874     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MobileCloud.2014.22     Document Type: Conference Paper
Times cited : (72)

References (26)
  • 2
    • 84903843805 scopus 로고    scopus 로고
    • Nielsen Company Who's Winning the U.S. Smartphone Market
    • Nielsen Company. (2013) Who's Winning the U.S. Smartphone Market. [Online]. Available: http://www.nielsen.com/us/en/newswire/2013/whos-winning- the-u-ssmartphone- market-.html
    • (2013)
  • 4
    • 84903824806 scopus 로고    scopus 로고
    • Android
    • Android. (2013) Android System Permissions. [Online]. Available: http://developer.android.com/guide/topics/security/permissions.html
    • (2013) Android System Permissions
  • 10
    • 84903846329 scopus 로고    scopus 로고
    • Mining permission patterns for contrasting clean and malicious android applications
    • V. Moonsamy, J. Rong and S. Liu, "Mining permission patterns for contrasting clean and malicious android applications, " Future Generation Computer Systems, 2013.
    • (2013) Future Generation Computer Systems
    • Moonsamy, V.1    Rong, J.2    Liu, S.3
  • 18
    • 84903829962 scopus 로고    scopus 로고
    • Performance evaluation on permissionbased detection for android malware
    • Springer Berlin Heidelberg
    • C. Y. Huang, Y. T. Tsai and C. H. Hsu, "Performance Evaluation on PermissionBased Detection for Malware, " Advances in Intelligent Systems and Applications-Volume 2, Springer Berlin Heidelberg, 2013, pp.111-120.
    • (2013) Advances in Intelligent Systems and Applications , vol.2 , pp. 111-120
    • Huang, C.Y.1    Tsai, Y.T.2    Hsu, C.H.3
  • 20
    • 60049085302 scopus 로고    scopus 로고
    • Understanding android security
    • IEEE
    • W. Enck, M. Ongtang and P. McDaniel, "Understanding android security, " Security & Privacy, IEEE, 2009, 7(1) pp.50-57.
    • (2009) Security & Privacy , vol.7 , Issue.1 , pp. 50-57
    • Enck, W.1    Ongtang, M.2    McDaniel, P.3
  • 21
    • 84903825400 scopus 로고    scopus 로고
    • Android. (2013) Android permissions. [Online]. Available: http://developer.android.com/reference/android/Manifest.permission.html
    • (2013) Android Permissions
    • Android1
  • 22
    • 0005685575 scopus 로고
    • C4. 5: Programs for machine learning
    • J. R. Quinlan, "C4. 5: programs for machine learning, " Morgan kaufmann, 1993.
    • (1993) Morgan Kaufmann
    • Quinlan, J.R.1
  • 23
    • 84903824716 scopus 로고    scopus 로고
    • WIKI
    • WIKI. (2013) C4.5 algorithm. [Online]. Available: http://en.wikipedia. org/wiki/C4.5 algorithm
    • (2013) C4.5 Algorithm


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.