-
1
-
-
84919466961
-
-
Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2013-2018, URL 〈〉
-
Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2013-2018, URL 〈〉, 2013. http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.pdf.
-
(2013)
-
-
-
2
-
-
84919469305
-
-
Juniper Networks Mobile Threat Center. Third Annual Mobile Threat Report: March 2012 to March 2013, URL 〈〉
-
Juniper Networks Mobile Threat Center. Third Annual Mobile Threat Report: March 2012 to March 2013, URL 〈〉, 2013. http://www.juniper.net/us/en/local/pdf/additional-resources/3rd-jnpr-mobile-threats-report-exec-summary.pdf.
-
(2013)
-
-
-
3
-
-
84919488904
-
-
Cisco 2014 Annual Security Report, URL 〈〉
-
Cisco 2014 Annual Security Report, URL 〈〉, 2014. http://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdf.
-
(2014)
-
-
-
4
-
-
80755187788
-
Android permissions demystified
-
in: Proceedings of the 18th ACM Conference on Computer and Communications Security, ACM, Chicago, IL, USA
-
A.P. Felt, E. Chin, S. Hanna, D. Song, D. Wagner, Android permissions demystified, in: Proceedings of the 18th ACM Conference on Computer and Communications Security, ACM, Chicago, IL, USA, 2011, pp. 627-638.
-
(2011)
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
5
-
-
74049155830
-
On lightweight mobile phone application certification
-
Proceedings of the 16th ACM Conference on Computer and Communications Security, ACM, Chicago, IL, USA
-
W. Enck, M. Ongtang, P. McDaniel, On lightweight mobile phone application certification, in: Proceedings of the 16th ACM Conference on Computer and Communications Security, ACM, Chicago, IL, USA, 2009, pp. 235-245.
-
(2009)
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
6
-
-
84868590213
-
A machine learning approach to Android malware detection
-
Intelligence and Security Informatics Conference (EISIC), 2012 European, IEEE
-
J. Sahs, L. Khan, A machine learning approach to Android malware detection, in: Intelligence and Security Informatics Conference (EISIC), 2012 European, IEEE, 2012, pp. 141-147.
-
(2012)
, pp. 141-147
-
-
Sahs, J.1
Khan, L.2
-
7
-
-
84868087373
-
Puma: permission usage to detect malware in android
-
International Joint Conference CISIS12-ICEUTE' 12-SOCO' 12 Special Sessions, Springer, Heidelberg
-
B. Sanz, I. Santos, C. Laorden, X. Ugarte-Pedrero, P.G. Bringas, G. Álvarez, Puma: permission usage to detect malware in android, in: International Joint Conference CISIS12-ICEUTE' 12-SOCO' 12 Special Sessions, Springer, Heidelberg, 2013, pp. 289-298.
-
(2013)
, pp. 289-298
-
-
Sanz, B.1
Santos, I.2
Laorden, C.3
Ugarte-Pedrero, X.4
Bringas, P.G.5
Álvarez, G.6
-
8
-
-
84887945501
-
MAMA: manifest analysis for malware detection in android
-
B. Sanz, I. Santos, C. Laorden, X. Ugarte-Pedrero, J. Nieves, P.G. Bringas, G. Álvarez Maranrón, MAMA: manifest analysis for malware detection in android, Cybern. Syst. 44 (6-7) (2013) 469-488, ISSN 0196-9722, . doi:10.1080/01969722.2013.803889.
-
(2013)
Cybern. Syst.
, vol.44
, Issue.6-7
, pp. 469-488
-
-
Sanz, B.1
Santos, I.2
Laorden, C.3
Ugarte-Pedrero, X.4
Nieves, J.5
Bringas, P.G.6
Álvarez Maranrón, G.7
-
9
-
-
84878368035
-
Dissecting android malware: characterization and evolution
-
2012 IEEE Symposium on Security and Privacy (SP), IEEE, San Francisco, California, USA, 2012,
-
Y. Zhou, X. Jiang, Dissecting android malware: characterization and evolution, in: 2012 IEEE Symposium on Security and Privacy (SP), IEEE, San Francisco, California, USA, 2012, pp. 95-109.
-
-
-
Zhou, Y.1
Jiang, X.2
-
10
-
-
70449482715
-
Static analysis of executables for collaborative malware detection on android
-
IEEE International Conference on Communications, 2009. ICC[U+05F3]09, IEEE, Dresden, Germany,
-
A.-D. Schmidt, R. Bye, H.-G. Schmidt, J. Clausen, O. Kiraz, K.A. Yuksel, S.A. Camtepe, S. Albayrak, Static analysis of executables for collaborative malware detection on android, in: IEEE International Conference on Communications, 2009. ICC[U+05F3]09, IEEE, Dresden, Germany, 2009, pp. 1-5.
-
(2009)
, pp. 1-5
-
-
Schmidt, A.-D.1
Bye, R.2
Schmidt, H.-G.3
Clausen, J.4
Kiraz, O.5
Yuksel, K.A.6
Camtepe, S.A.7
Albayrak, S.8
-
11
-
-
80755143401
-
Crowdroid: behavior-based malware detection system for android
-
Proceedings of the First ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, ACM, Chicago, IL, USA
-
I. Burguera, U. Zurutuza, S. Nadjm-Tehrani, Crowdroid: behavior-based malware detection system for android, in: Proceedings of the First ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, ACM, Chicago, IL, USA, 2011, pp. 15-26.
-
(2011)
, pp. 15-26
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-Tehrani, S.3
-
12
-
-
85025148063
-
DroidAPIMiner: mining API-level features for robust malware detection in android
-
Security and Privacy in Communication Networks, Springer, Heidelberg
-
Y. Aafer, W. Du, H. Yin, DroidAPIMiner: mining API-level features for robust malware detection in android, in: Security and Privacy in Communication Networks, Springer, Heidelberg, 2013, pp. 86-103.
-
(2013)
, pp. 86-103
-
-
Aafer, Y.1
Du, W.2
Yin, H.3
-
13
-
-
84856225193
-
"Andromaly". a behavioral malware detection framework for android devices
-
Shabtai A., Kanonov U., Elovici Y., Glezer C., Weiss Y. "Andromaly". a behavioral malware detection framework for android devices. J. Intell. Inf. Syst. 2012, 38(1):161-190.
-
(2012)
J. Intell. Inf. Syst.
, vol.38
, Issue.1
, pp. 161-190
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
Glezer, C.4
Weiss, Y.5
-
14
-
-
84866946869
-
Automatically securing permission-based software by reducing the attack surface: an application to android
-
Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, ACM
-
A. Bartel, J. Klein, Y. Le Traon, M. Monperrus, Automatically securing permission-based software by reducing the attack surface: an application to android, in: Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, ACM, 2012, pp. 274-277.
-
(2012)
, pp. 274-277
-
-
Bartel, A.1
Klein, J.2
Le Traon, Y.3
Monperrus, M.4
-
15
-
-
84887611642
-
Optimal selection of ensemble classifiers using measures of competence and diversity of base classifiers
-
Lysiak R., Kurzynski M., Woloszynski T. Optimal selection of ensemble classifiers using measures of competence and diversity of base classifiers. Neurocomputing 2014, 126:29-35.
-
(2014)
Neurocomputing
, vol.126
, pp. 29-35
-
-
Lysiak, R.1
Kurzynski, M.2
Woloszynski, T.3
-
16
-
-
84887090067
-
A survey of multiple classifier systems as hybrid systems
-
Woźniak M., Graña M., Corchado E. A survey of multiple classifier systems as hybrid systems. Inf. Fusion 2014, 16:3-17.
-
(2014)
Inf. Fusion
, vol.16
, pp. 3-17
-
-
Woźniak, M.1
Graña, M.2
Corchado, E.3
-
17
-
-
0003524305
-
A Preliminary Attempt to Apply Detection and Estimation Theory to Intrusion Detection, Technical Report
-
Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden
-
S. Axelsson, A Preliminary Attempt to Apply Detection and Estimation Theory to Intrusion Detection, Technical Report, Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden, 2000.
-
(2000)
-
-
Axelsson, S.1
-
18
-
-
0004204719
-
A data mining framework for constructing features and models for intrusion detection systems
-
Ph.D. Dissertation, Columbia university, 1999.
-
W. Lee, A data mining framework for constructing features and models for intrusion detection systems, Ph.D. Dissertation, Columbia university, 1999.
-
-
-
Lee, W.1
-
20
-
-
84863457581
-
One-class support vector ensembles for image segmentation and classification
-
Cyganek B. One-class support vector ensembles for image segmentation and classification. J. Math. Imaging Vis. 2012, 42(2-3):103-117.
-
(2012)
J. Math. Imaging Vis.
, vol.42
, Issue.2-3
, pp. 103-117
-
-
Cyganek, B.1
-
21
-
-
84894427964
-
Clustering-based ensembles for one-class classification
-
Krawczyk B., Woźniak M., Cyganek B. Clustering-based ensembles for one-class classification. Inf. Sci. 2014, 264:182-195.
-
(2014)
Inf. Sci.
, vol.264
, pp. 182-195
-
-
Krawczyk, B.1
Woźniak, M.2
Cyganek, B.3
-
22
-
-
84894490812
-
Empowering difficult classes with a similarity-based aggregation in multi-class classification problems
-
Galar M., Fernández A., Barrenechea E., Herrera F. Empowering difficult classes with a similarity-based aggregation in multi-class classification problems. Inf. Sci. 2014, 264:135-157.
-
(2014)
Inf. Sci.
, vol.264
, pp. 135-157
-
-
Galar, M.1
Fernández, A.2
Barrenechea, E.3
Herrera, F.4
-
23
-
-
84896878762
-
Improved adaptive splitting and selection: the hybrid training method of a classifier based on a feature space partitioning
-
1430007
-
K. Jackowski, B. Krawczyk, M. Woźniak, Improved adaptive splitting and selection: the hybrid training method of a classifier based on a feature space partitioning, Int. J. Neur. Syst. 24 (2014) 1430007, . http://dx.doi.org/10.1142/S0129065714300071.
-
(2014)
Int. J. Neur. Syst
, vol.24
-
-
Jackowski, K.1
Krawczyk, B.2
Woźniak, M.3
-
24
-
-
79952959006
-
Multiview, broadband acoustic classification of marine fish. a machine learning framework and comparative analysis
-
Roberts P.L., Jaffe J.S., Trivedi M.M. Multiview, broadband acoustic classification of marine fish. a machine learning framework and comparative analysis. IEEE J. Ocean. Eng. 2011, 36(1):90-104.
-
(2011)
IEEE J. Ocean. Eng.
, vol.36
, Issue.1
, pp. 90-104
-
-
Roberts, P.L.1
Jaffe, J.S.2
Trivedi, M.M.3
-
25
-
-
84874105145
-
Opcode sequences as representation of executables for data-mining-based unknown malware detection
-
Santos I., Brezo F., Ugarte-Pedrero X., Bringas P.G. Opcode sequences as representation of executables for data-mining-based unknown malware detection. Inf. Sci. 2013, 231:64-82.
-
(2013)
Inf. Sci.
, vol.231
, pp. 64-82
-
-
Santos, I.1
Brezo, F.2
Ugarte-Pedrero, X.3
Bringas, P.G.4
-
26
-
-
84874604512
-
SVM training phase reduction using dataset feature filtering for malware detection
-
O'KANE P., Sezer S., McLaughlin K., Im E.G. SVM training phase reduction using dataset feature filtering for malware detection. IEEE Trans. Inf. Forensics Secur. 2013, 8(3-4):500-509.
-
(2013)
IEEE Trans. Inf. Forensics Secur.
, vol.8
, Issue.3-4
, pp. 500-509
-
-
Kane, P.1
Sezer, S.2
McLaughlin, K.3
Im, E.G.4
-
27
-
-
84919475748
-
Discovering attribute dependence in databases by integrating symbolic learning and statistical analysis techniques
-
Proceeding of the AAAI-93 Workshop on Knowledge Discovery in Databases, Washington, DC
-
I. Imam, R. Michalski, L. Kerschberg, Discovering attribute dependence in databases by integrating symbolic learning and statistical analysis techniques, in: Proceeding of the AAAI-93 Workshop on Knowledge Discovery in Databases, Washington, DC, 1993.
-
(1993)
-
-
Imam, I.1
Michalski, R.2
Kerschberg, L.3
-
28
-
-
0027002164
-
The feature selection problem: Traditional methods and a new algorithm
-
AAAI
-
K. Kira, L.A. Rendell, The feature selection problem: Traditional methods and a new algorithm, in: AAAI, 1992, pp. 129-134.
-
(1992)
, pp. 129-134
-
-
Kira, K.1
Rendell, L.A.2
-
30
-
-
58149321460
-
Boosting a weak learning algorithm by majority
-
Freund Y. Boosting a weak learning algorithm by majority. Inf. Comput. 1995, 121(2):256-285.
-
(1995)
Inf. Comput.
, vol.121
, Issue.2
, pp. 256-285
-
-
Freund, Y.1
-
31
-
-
0002978642
-
Experiments with a new boosting algorithm
-
ICML
-
Y. Freund, R.E. Schapire, et al., Experiments with a new boosting algorithm, in: ICML, vol. 96, 1996, pp. 148-156.
-
(1996)
, vol.96
, pp. 148-156
-
-
Freund, Y.1
Schapire, R.E.2
-
32
-
-
33744584654
-
Induction of decision trees
-
Quinlan J.R. Induction of decision trees. Mach. Learn. 1986, 1(1):81-106.
-
(1986)
Mach. Learn.
, vol.1
, Issue.1
, pp. 81-106
-
-
Quinlan, J.R.1
-
33
-
-
85065198637
-
-
Induction of one-level decision trees, in: ML, Citeseer
-
W. Iba, P. Langley, Induction of one-level decision trees, in: ML, Citeseer, 1992, pp. 233-240.
-
(1992)
, pp. 233-240
-
-
Iba, W.1
Langley, P.2
-
34
-
-
0035478854
-
Random forests
-
Breiman L. Random forests. Mach. Learn. 2001, 45(1):5-32.
-
(2001)
Mach. Learn.
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
35
-
-
50649107683
-
Learning, modeling, and classification of vehicle track patterns from live video
-
Morris B.T., Trivedi M.M. Learning, modeling, and classification of vehicle track patterns from live video. IEEE Trans. Intell. Transp. Syst. 2008, 9(3):425-437.
-
(2008)
IEEE Trans. Intell. Transp. Syst.
, vol.9
, Issue.3
, pp. 425-437
-
-
Morris, B.T.1
Trivedi, M.M.2
-
36
-
-
84919482646
-
-
Malware Geome Project, URL 〈〉
-
Malware Geome Project, URL 〈〉, 2012. http://www.malgenomeproject.org.
-
(2012)
-
-
-
37
-
-
76749092270
-
The WEKA data mining software. an update
-
Hall M., Frank E., Holmes G., Pfahringer B., Reutemann P., Witten I.H. The WEKA data mining software. an update. ACM SIGKDD Explor. Newslett. 2009, 11(1):10-18.
-
(2009)
ACM SIGKDD Explor. Newslett.
, vol.11
, Issue.1
, pp. 10-18
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.H.6
-
38
-
-
0033570831
-
Combined 5×2 cv F test for comparing supervised classification learning algorithms
-
Alpaydm E. Combined 5×2 cv F test for comparing supervised classification learning algorithms. Neural Comput. 1999, 11(8):1885-1892.
-
(1999)
Neural Comput.
, vol.11
, Issue.8
, pp. 1885-1892
-
-
Alpaydm, E.1
|