-
2
-
-
84903843805
-
-
Nielsen Company Who's Winning the U.S. Smartphone Market
-
Nielsen Company. (2013) Who's Winning the U.S. Smartphone Market. [Online]. Available: http://www.nielsen.com/us/en/newswire/2013/whos-winning- the-u-ssmartphone- market-.html
-
(2013)
-
-
-
3
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Y. Zhou, Z.Wang, W. Zhou and X. Jiang, "Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets, " Proc. 19th Annual Network and Distributed System Security Symposium, 2012.
-
(2012)
Proc. 19th Annual Network and Distributed System Security Symposium
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
-
4
-
-
84903824806
-
-
Android
-
Android. (2013) Android System Permissions. [Online]. Available: http://developer.android.com/guide/topics/security/permissions.html
-
(2013)
Android System Permissions
-
-
-
5
-
-
84865024594
-
Android permissions: User attention, comprehension, and behavior
-
A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin and D. Wagner, "Android permissions: User attention, comprehension, and behavior, " Proc. Eighth Symposium on Usable Privacy and Security, ACM, 2012, p.3.
-
(2012)
Proc. Eighth Symposium on Usable Privacy and Security ACM
, pp. 3
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
6
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
D. Barrera, H. G. Kayacik, P. C. van Oorschot, A. Somayaji, "A methodology for empirical analysis of permission-based security models and its application to android, " Proc. 17th ACM conference on Computer and communications security, ACM, 2010, pp.73-84.
-
(2010)
Proc. 17th ACM Conference on Computer and Communications Security, ACM
, pp. 73-84
-
-
Barrera, D.1
Kayacik, H.G.2
Van Oorschot, P.C.3
Somayaji, A.4
-
7
-
-
80755172898
-
The effectiveness of application permissions
-
A. P. Felt, K. Greenwood and D. Wagner, "The effectiveness of application permissions, " Proc. 2nd USENIX conference on Web application development, USENIX Association, 2011, pp.7-7.
-
(2011)
Proc. 2nd USENIX Conference on Web Application Development, USENIX Association
, pp. 7-7
-
-
Felt, A.P.1
Greenwood, K.2
Wagner, D.3
-
8
-
-
80755187788
-
Android permissions demystified
-
ACM
-
A. p. Felt, E. Chin, S. Hanna, D. Song and D. Wagner, "Android permissions demystified, " Proc. 18th ACM conference on Computer and communications security, ACM, 2011, pp.627-638.
-
(2011)
Proc. 18th ACM Conference on Computer and Communications Security
, pp. 627-638
-
-
Felt, A.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
9
-
-
84874080269
-
Mining permission request patterns from android and facebook applications
-
M. Frank, B. Dong, A. P. Felt and D. Song, "Mining Permission Request Patterns from Android and Facebook Applications, " 2012 IEEE 12th International Conference on Data Mining (ICDM), IEEE, 2012, pp.870- 875.
-
(2012)
2012 IEEE 12th International Conference on Data Mining (ICDM), IEEE
, pp. 870-875
-
-
Frank, M.1
Dong, B.2
Felt, A.P.3
Song, D.4
-
10
-
-
84903846329
-
Mining permission patterns for contrasting clean and malicious android applications
-
V. Moonsamy, J. Rong and S. Liu, "Mining permission patterns for contrasting clean and malicious android applications, " Future Generation Computer Systems, 2013.
-
(2013)
Future Generation Computer Systems
-
-
Moonsamy, V.1
Rong, J.2
Liu, S.3
-
11
-
-
84869388345
-
Pscout: Analyzing the android permission specification
-
ACM
-
K. W. Y. Au, Y. F. Zhou, Z. Huang and D. Lie, "Pscout: analyzing the android permission specification, " Proc. 2012 ACM conference on Computer and communications security, ACM, 2012, pp.217-228.
-
(2012)
Proc. 2012 ACM Conference on Computer and Communications Security
, pp. 217-228
-
-
Au, K.W.Y.1
Zhou, Y.F.2
Huang, Z.3
Lie, D.4
-
12
-
-
74049155830
-
On lightweight mobile phone application certification
-
ACM
-
W. Enck, M. Ongtang and P. McDaniel, "On lightweight mobile phone application certification, " Proc. 16th ACM conference on Computer and communications security, ACM, 2009, pp.235-245.
-
(2009)
Proc. 16th ACM Conference on Computer and Communications Security
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
13
-
-
84864033989
-
Android permissions: A perspective combining risks and benefits
-
ACM
-
B. P. Sarma, N. Li, C. Gates, R. Potharaju, C. Nita-Rotaru and I. Molloy, "Android permissions: a perspective combining risks and benefits, " Proc. 17th ACM symposium on Access Control Models and Technologies, ACM, 2012, pp.13-22.
-
(2012)
Proc. 17th ACM Symposium on Access Control Models and Technologies
, pp. 13-22
-
-
Sarma, B.P.1
Li, N.2
Gates, C.3
Potharaju, R.4
Nita-Rotaru, C.5
Molloy, I.6
-
14
-
-
84869432690
-
Using probabilistic generative models for ranking risks of android apps
-
ACM
-
H. Peng, C. Gates, B. Sarma, N. Li, Y. Qi, R. Potharaju et al, "Using probabilistic generative models for ranking risks of android apps, " Proc. 2012 ACM conference on Computer and communications security, ACM, 2012, pp.241-252.
-
(2012)
Proc. 2012 ACM Conference on Computer and Communications Security
, pp. 241-252
-
-
Peng, H.1
Gates, C.2
Sarma, B.3
Li, N.4
Qi, Y.5
Potharaju Et Al, R.6
-
15
-
-
84860674786
-
On the automatic categorisation of android applications
-
IEEE
-
B. Sanz, I. Santos, C. Laorden, X. Ugarte-Pedrero and P. G. Bringas, "On the automatic categorisation of android applications, " 2012 IEEE Consumer Communications and Networking Conference (CCNC), IEEE, 2012, pp.149-153.
-
(2012)
2012 IEEE Consumer Communications and Networking Conference (CCNC)
, pp. 149-153
-
-
Sanz, B.1
Santos, I.2
Laorden, C.3
Ugarte-Pedrero, X.4
Bringas, P.G.5
-
16
-
-
84868087373
-
PUMA: Permission usage to detect malware in android
-
Springer Berlin Heidelberg
-
B. Sanz, I. Santos, C. Laorden, X. Ugarte-Pedrero, P. G. Bringas and G. Alvarez, "PUMA: Permission Usage to Detect Malware in Android, " International Joint Conference CISIS12-ICEUTE 12-SOCO 12 Special Sessions, Springer Berlin Heidelberg, 2013, pp.289-298.
-
(2013)
International Joint Conference CISIS12-ICEUTE 12-SOCO 12 Special Sessions
, pp. 289-298
-
-
Sanz, B.1
Santos, I.2
Laorden, C.3
Ugarte-Pedrero, X.4
Bringas, P.G.5
Alvarez, G.6
-
17
-
-
79951646815
-
Automated static code analysis for classifying android applications using machine learning
-
IEEE
-
A. Shabtai, Y. Fledel and Y. Elovici, "Automated static code analysis for classifying android applications using machine learning, " 2010 IEEE International Conference on Computational Intelligence and Security (CIS), IEEE, 2010, pp.329-333.
-
(2010)
2010 IEEE International Conference on Computational Intelligence and Security (CIS)
, pp. 329-333
-
-
Shabtai, A.1
Fledel, Y.2
Elovici, Y.3
-
18
-
-
84903829962
-
Performance evaluation on permissionbased detection for android malware
-
Springer Berlin Heidelberg
-
C. Y. Huang, Y. T. Tsai and C. H. Hsu, "Performance Evaluation on PermissionBased Detection for Malware, " Advances in Intelligent Systems and Applications-Volume 2, Springer Berlin Heidelberg, 2013, pp.111-120.
-
(2013)
Advances in Intelligent Systems and Applications
, vol.2
, pp. 111-120
-
-
Huang, C.Y.1
Tsai, Y.T.2
Hsu, C.H.3
-
19
-
-
84881033715
-
A new android malware detection approach using bayesian classification
-
IEEE
-
S. Y. Yerima, S. Sezer, G. McWilliams and I. Muttik, "A New Android Malware Detection Approach Using Bayesian Classification, " 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), IEEE, 2013, pp.121-128.
-
(2013)
2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA)
, pp. 121-128
-
-
Yerima, S.Y.1
Sezer, S.2
McWilliams, G.3
Muttik, I.4
-
20
-
-
60049085302
-
Understanding android security
-
IEEE
-
W. Enck, M. Ongtang and P. McDaniel, "Understanding android security, " Security & Privacy, IEEE, 2009, 7(1) pp.50-57.
-
(2009)
Security & Privacy
, vol.7
, Issue.1
, pp. 50-57
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
21
-
-
84903825400
-
-
Android. (2013) Android permissions. [Online]. Available: http://developer.android.com/reference/android/Manifest.permission.html
-
(2013)
Android Permissions
-
-
Android1
-
22
-
-
0005685575
-
C4. 5: Programs for machine learning
-
J. R. Quinlan, "C4. 5: programs for machine learning, " Morgan kaufmann, 1993.
-
(1993)
Morgan Kaufmann
-
-
Quinlan, J.R.1
-
23
-
-
84903824716
-
-
WIKI
-
WIKI. (2013) C4.5 algorithm. [Online]. Available: http://en.wikipedia. org/wiki/C4.5 algorithm
-
(2013)
C4.5 Algorithm
-
-
|