-
1
-
-
84903989021
-
-
Google Bouncer. http://goo.gl/QnC6G 2014.
-
(2014)
Google Bouncer
-
-
-
2
-
-
2442424268
-
Naive Bayes versus Decision Trees in Intrusion Detection Systems
-
N. Amor, S. Benferhat, and Z. Elouedi, "Naive Bayes versus Decision Trees in Intrusion Detection Systems," Proc. ACM Symp. Applied Computing, pp. 420-424, 2004.
-
(2004)
Proc. ACM Symp. Applied Computing
, pp. 420-424
-
-
Amor, N.1
Benferhat, S.2
Elouedi, Z.3
-
3
-
-
84869388345
-
PScout: Analyzing the Android Permission Specification
-
K.W.Y. Au, Y.F. Zhou, Z. Huang, and D. Lie, "PScout: Analyzing the Android Permission Specification," Proc. ACM Conf. Computer and Comm. Security (CCS '12), pp. 217-228, 2012.
-
(2012)
Proc. ACM Conf. Computer and Comm. Security (CCS '12)
, pp. 217-228
-
-
Au, K.W.Y.1
Zhou, Y.F.2
Huang, Z.3
Lie, D.4
-
4
-
-
78649990344
-
A Methodology for Empirical Analysis of Permission-Based Security Models and Its Application to Android
-
D. Barrera, H.G. Kayacik, P.C. van Oorschot, and A. Somayaji, "A Methodology for Empirical Analysis of Permission-Based Security Models and Its Application to Android," Proc. 17th ACM Conf. Computer and Comm. Security, pp. 73-84, 2010.
-
(2010)
Proc. 17th ACM Conf. Computer and Comm. Security
, pp. 73-84
-
-
Barrera, D.1
Kayacik, H.G.2
Van Oorschot, P.C.3
Somayaji, A.4
-
6
-
-
0141607824
-
Latent Dirichlet Allocation
-
D.M. Blei, A.Y. Ng, and M.I. Jordan, "Latent Dirichlet Allocation," J. Machine Learning Research, vol. 3, pp. 993-1022, 2003.
-
(2003)
J. Machine Learning Research
, vol.3
, pp. 993-1022
-
-
Blei, D.M.1
Ng, A.Y.2
Jordan, M.I.3
-
7
-
-
84879543890
-
MAST: Triage for Market-Scale Mobile Malware Analysis
-
S. Chakradeo, B. Reaves, P. Traynor, and W. Enck, "MAST: Triage for Market-Scale Mobile Malware Analysis," Proc. Sixth ACM Conf. Security and Privacy in Wireless and Mobile Networks (WISEC '13), pp. 13-24, 2013.
-
(2013)
Proc. Sixth ACM Conf. Security and Privacy in Wireless and Mobile Networks (WISEC '13)
, pp. 13-24
-
-
Chakradeo, S.1
Reaves, B.2
Traynor, P.3
Enck, W.4
-
8
-
-
84864978921
-
Measuring User Confidence in Smartphone Security and Privacy
-
E. Chin, A.P. Felt, V. Sekar, and D. Wagner, "Measuring User Confidence in Smartphone Security and Privacy," Proc. Eighth Symp. Usable Privacy and Security, (SOUPS '12), article 1, 2012.
-
(2012)
Proc. Eighth Symp. Usable Privacy and Security, (SOUPS '12)
, pp. 1
-
-
Chin, E.1
Felt, A.P.2
Sekar, V.3
Wagner, D.4
-
9
-
-
79955570859
-
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
-
W. Enck, P. Gilbert, B. Chun, L.P. Cox, J. Jung, P. McDaniel, and A.N Sheth, "TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones," Proc. Ninth USENIX Conf. Operating Systems Design and Implementation, article 1-6, 2010.
-
(2010)
Proc. Ninth USENIX Conf. Operating Systems Design and Implementation
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
10
-
-
85025700509
-
A Study of Android Application Security
-
W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri, "A Study of Android Application Security," Proc. 20th USENIX Conf. Security, (SEC '11), pp. 21-21, 2011.
-
(2011)
Proc. 20th USENIX Conf. Security, (SEC '11)
, pp. 21-21
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
11
-
-
74049155830
-
On Lightweight Mobile Phone Application Certification
-
W. Enck, M. Ongtang, and P. McDaniel, "On Lightweight Mobile Phone Application Certification," Proc. 16th ACM Conf. Computer and Comm. Security, (CCS '09), pp. 235-245, 2009.
-
(2009)
Proc. 16th ACM Conf. Computer and Comm. Security, (CCS '09)
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
12
-
-
80755187788
-
Android Permissions Demystified
-
A.P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, "Android Permissions Demystified," Proc. 18th ACM Conf. Computer and Comm. Security, pp. 627-638, 2011.
-
(2011)
Proc. 18th ACM Conf. Computer and Comm. Security
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
14
-
-
80755187788
-
Android Permissions Demystified
-
A.P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, "Android Permissions Demystified," Proc. 18th ACM Conf. Computer and Comm. Security, (CCS '11), pp. 627-638, 2011.
-
(2011)
Proc. 18th ACM Conf. Computer and Comm. Security, (CCS '11)
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
15
-
-
80052014671
-
-
Technical Report UCB/EECS-2010-143, EECS Department, Univ. of California, Berkeley, Dec
-
A.P. Felt, K. Greenwood, and D. Wagner, "The Effectiveness of Install-Time Permission Systems for Third-Party Applications," Technical Report UCB/EECS-2010-143, EECS Department, Univ. of California, Berkeley, Dec. 2010.
-
(2010)
The Effectiveness of Install-Time Permission Systems for Third-Party Applications
-
-
Felt, A.P.1
Greenwood, K.2
Wagner, D.3
-
16
-
-
80755172898
-
The Effectiveness of Application Permissions
-
A.P. Felt, K. Greenwood, and D. Wagner, "The Effectiveness of Application Permissions," Proc. Second USENIX Conf. Web Application Development, (WebApps '11), 2011.
-
Proc. Second USENIX Conf. Web Application Development, (WebApps '11), 2011
-
-
Felt, A.P.1
Greenwood, K.2
Wagner, D.3
-
17
-
-
84865024594
-
Android Permissions: User Attention, Comprehension, and Behavior
-
A.P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner, "Android Permissions: User Attention, Comprehension, and Behavior," Proc. Eighth Symp. Usable Privacy and Security, article 3, 2012.
-
(2012)
Proc. Eighth Symp. Usable Privacy and Security
, pp. 3
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
19
-
-
84864334986
-
RiskRanker: Scalable and Accurate Zero-Day Android Malware Detection
-
M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang, "RiskRanker: Scalable and Accurate Zero-Day Android Malware Detection," Proc. 10th Int'l Conf. Mobile Systems, Applications, and Services, (MobiSys '12), pp. 281-294, 2012.
-
(2012)
Proc. 10th Int'l Conf. Mobile Systems, Applications, and Services, (MobiSys '12)
, pp. 281-294
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
20
-
-
84867438639
-
A Conundrum of Permissions: Installing Applications on an Android Smartphone
-
P.G. Kelley, S. Consolvo, L.F. Cranor, J. Jung, N. Sadeh, and D. Wetherall, "A Conundrum of Permissions: Installing Applications on an Android Smartphone," Proc. Workshop Usable Security (USEC '12), Feb. 2012.
-
Proc. Workshop Usable Security (USEC '12), Feb. 2012
-
-
Kelley, P.G.1
Consolvo, S.2
Cranor, L.F.3
Jung, J.4
Sadeh, N.5
Wetherall, D.6
-
21
-
-
23744482045
-
Consumer Processing of Hazard Warning Information
-
June
-
W.A. Magat, W.K. Viscusi, and J. Huber, "Consumer Processing of Hazard Warning Information," J. Risk and Uncertainty, vol. 1, no. 2, pp. 201-32, June 1988.
-
(1988)
J. Risk and Uncertainty
, vol.1
, Issue.2
, pp. 201-232
-
-
Magat, W.A.1
Viscusi, W.K.2
Huber, J.3
-
22
-
-
84904809957
-
Spam Filtering with Naive Bayes-Which Naive Bayes
-
V. Metsis, I. Androutsopoulos, and G. Paliouras, "Spam Filtering with Naive Bayes-Which Naive Bayes," Proc. Third Conf. Email and Anti-Spam (CEAS '06), vol. 17, pp. 28-69, 2006.
-
(2006)
Proc. Third Conf. Email and Anti-Spam (CEAS '06)
, vol.17
, pp. 28-69
-
-
Metsis, V.1
Androutsopoulos, I.2
Paliouras, G.3
-
23
-
-
77954487766
-
Apex: Extending Android Permission Model and Enforcement with User-Defined Runtime Constraints
-
M. Nauman, S. Khan, and X. Zhang, "Apex: Extending Android Permission Model and Enforcement with User-Defined Runtime Constraints," Proc. Fifth ACM Symp. Information, Computer and Comm. Security, pp. 328-332, 2010.
-
(2010)
Proc. Fifth ACM Symp. Information, Computer and Comm. Security
, pp. 328-332
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
24
-
-
77950851532
-
Semantically Rich Application-Centric Security in Android
-
M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel, "Semantically Rich Application-Centric Security in Android," Proc. IEEE Ann. Conf. Computer Security Applications (ACSAC '09), pp. 340-349, 2009.
-
(2009)
Proc. IEEE Ann. Conf. Computer Security Applications (ACSAC '09)
, pp. 340-349
-
-
Ongtang, M.1
McLaughlin, S.2
Enck, W.3
McDaniel, P.4
-
25
-
-
84869432690
-
Using Probabilistic Generative Models for Ranking Risks of Android Apps
-
H. Peng, C. Gates, B. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, and I. Molloy, "Using Probabilistic Generative Models for Ranking Risks of Android Apps," Proc. Conf. Computer and Comm. Security, (CCS '12), pp. 241-252, 2012.
-
(2012)
Proc. Conf. Computer and Comm. Security, (CCS '12)
, pp. 241-252
-
-
Peng, H.1
Gates, C.2
Sarma, B.3
Li, N.4
Qi, Y.5
Potharaju, R.6
Nita-Rotaru, C.7
Molloy, I.8
-
26
-
-
78751498804
-
Paranoid Android: Versatile Protection for Smartphones
-
G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos, "Paranoid Android: Versatile Protection for Smartphones," Proc. 26th Ann. Conf. Computer Security Applications, pp. 347-356, 2010.
-
(2010)
Proc. 26th Ann. Conf. Computer Security Applications
, pp. 347-356
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
27
-
-
84863138661
-
Plagiarizing Smartphone Applications: Attack Strategies and Defense
-
R. Potharaju, A. Newell, C. Nita-Rotaru, and X. Zhang, "Plagiarizing Smartphone Applications: Attack Strategies and Defense," Proc. Fourth Int'l Conf. Eng. Secure Software and Systems, pp. 106-120, 2012.
-
(2012)
Proc. Fourth Int'l Conf. Eng. Secure Software and Systems
, pp. 106-120
-
-
Potharaju, R.1
Newell, A.2
Nita-Rotaru, C.3
Zhang, X.4
-
28
-
-
84864033989
-
Android Permissions: A Perspective Combining Risks and Benefits
-
B.P. Sarma, N. Li, C. Gates, R. Potharaju, C. Nita-Rotaru, and I. Molloy, "Android Permissions: A Perspective Combining Risks and Benefits," Proc. 17th ACM Symp. Access Control Models and Technologies (SACMAT '12), 2012.
-
Proc. 17th ACM Symp. Access Control Models and Technologies (SACMAT '12), 2012
-
-
Sarma, B.P.1
Li, N.2
Gates, C.3
Potharaju, R.4
Nita-Rotaru, C.5
Molloy, I.6
-
30
-
-
26844565732
-
Active Platform Security through Intrusion Detection Using Naive Bayesian Network for Anomaly Detection
-
A. Sebyala, T. Olukemi, and L. Sacks, "Active Platform Security through Intrusion Detection Using Naive Bayesian Network for Anomaly Detection," Proc. London Comm. Symp., 2002.
-
Proc. London Comm. Symp., 2002
-
-
Sebyala, A.1
Olukemi, T.2
Sacks, L.3
-
31
-
-
84867714245
-
Applying Behavioral Detection on Android-Based Devices
-
A. Shabtai and Y. Elovici, "Applying Behavioral Detection on Android-Based Devices," Proc. Mobile Wireless Middleware, Operating Systems, and Applications, pp. 235-249, 2010.
-
(2010)
Proc. Mobile Wireless Middleware, Operating Systems, and Applications
, pp. 235-249
-
-
Shabtai, A.1
Elovici, Y.2
-
32
-
-
67650834914
-
Better Naive Bayes Classication for High-Precision Spam Detection
-
Y. Song, A. Kocz, and C.L. Giles, "Better Naive Bayes Classication for High-Precision Spam Detection," Software Practice and Experience, vol. 39, no. 11, pp. 1003-1024, 2009.
-
(2009)
Software Practice and Experience
, vol.39
, Issue.11
, pp. 1003-1024
-
-
Song, Y.1
Kocz, A.2
Giles, C.L.3
-
33
-
-
84903733085
-
Investigating User Privacy in Android Ad Libraries
-
R. Stevens, C. Gibler, J. Crussell, J. Erickson, and H. Chen, "Investigating User Privacy in Android Ad Libraries," Proc. IEEE Mobile Security Technologies (MoST '12), 2012.
-
Proc. IEEE Mobile Security Technologies (MoST '12), 2012
-
-
Stevens, R.1
Gibler, C.2
Crussell, J.3
Erickson, J.4
Chen, H.5
-
34
-
-
11144338913
-
Intended and Unintended Consequences of Warning Messages: A Review and Synthesis of Empirical Research
-
D.W. Stewart and I.M. Martin, "Intended and Unintended Consequences of Warning Messages: A Review and Synthesis of Empirical Research," J. Public Policy & Marketing, vol. 13, no. 1, pp. 1-19, 1994.
-
(1994)
J. Public Policy & Marketing
, vol.13
, Issue.1
, pp. 1-19
-
-
Stewart, D.W.1
Martin, I.M.2
-
35
-
-
84864037440
-
Curbing Android Permission Creep
-
T. Vidas, N. Christin, and L.F. Cranor, "Curbing Android Permission Creep," Proc. Workshop Web 2.0 Security and Privacy, vol. 2, 2011.
-
(2011)
Proc. Workshop Web 2.0 Security and Privacy
, vol.2
-
-
Vidas, T.1
Christin, N.2
Cranor, L.F.3
|