메뉴 건너뛰기




Volumn 12, Issue 4, 2015, Pages 400-412

A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code

Author keywords

Android; discriminative model; machine learning; malicious application

Indexed keywords

ANDROID (OPERATING SYSTEM); CODES (SYMBOLS); COMPUTER PROGRAMMING LANGUAGES; LEARNING SYSTEMS; MALWARE;

EID: 84975230776     PISSN: 15455971     EISSN: 19410018     Source Type: Journal    
DOI: 10.1109/TDSC.2014.2355839     Document Type: Article
Times cited : (143)

References (32)
  • 5
    • 34548105186 scopus 로고    scopus 로고
    • Large-scale Bayesian logistic regression for text categorization
    • A. Genkin, D. D. Lewis, and D. Madigan, "Large-scale Bayesian logistic regression for text categorization," Technometrics, vol. 49, no. 3, pp. 291-304, 2007.
    • (2007) Technometrics , vol.49 , Issue.3 , pp. 291-304
    • Genkin, A.1    Lewis, D.D.2    Madigan, D.3
  • 6
    • 84867883244 scopus 로고    scopus 로고
    • A discriminative data-dependent mixture-model approach for multiple instance learning in image classification
    • Q. Wang, L. Si, and D. Zhang, "A discriminative data-dependent mixture-model approach for multiple instance learning in image classification," in Proc. 12th Eur. Conf. Comput. Vis.-Vol. Part IV, 2012, pp. 660-673.
    • (2012) Proc. 12th Eur. Conf. Comput. Vis.-Vol. Part IV , pp. 660-673
    • Wang, Q.1    Si, L.2    Zhang, D.3
  • 9
    • 68549133155 scopus 로고    scopus 로고
    • Learning from imbalanced data
    • Sep.
    • H. He and E. A. Garcia, "Learning from imbalanced data," IEEE Trans. Knowl. Data Eng., vol. 21, no. 9, pp. 1263-1284, Sep. 2009.
    • (2009) IEEE Trans. Knowl. Data Eng. , vol.21 , Issue.9 , pp. 1263-1284
    • He, H.1    Garcia, E.A.2
  • 10
    • 33845768389 scopus 로고    scopus 로고
    • Learning to detect and classify malicious executables in the wild
    • Dec.
    • J. Z. Kolter and M. A. Maloof, "Learning to detect and classify malicious executables in the wild," J. Mach. Learn. Res., vol. 7, pp. 2721-2744, Dec. 2006.
    • (2006) J. Mach. Learn. Res. , vol.7 , pp. 2721-2744
    • Kolter, J.Z.1    Maloof, M.A.2
  • 12
    • 84857956709 scopus 로고    scopus 로고
    • Android: Static analysis using similarity distance
    • A. Desnos, "Android: Static analysis using similarity distance," in Proc. 45th Hawaii Int. Conf. Syst. Sci., 2012, pp. 5394-5403.
    • (2012) Proc. 45th Hawaii Int. Conf. Syst. Sci. , pp. 5394-5403
    • Desnos, A.1
  • 15
  • 25
    • 33749249600 scopus 로고    scopus 로고
    • The relationship between precision-recall and ROC curves
    • J. Davis and M. Goadrich, "The relationship between Precision-Recall and ROC curves," in Proc. 23rd Int. Conf. Mach. Learn., 2006, pp. 233-240.
    • (2006) Proc. 23rd Int. Conf. Mach. Learn. , pp. 233-240
    • Davis, J.1    Goadrich, M.2
  • 26
    • 0003141935 scopus 로고    scopus 로고
    • A comparative study on feature selection in text categorization
    • Y. Yang and J. O. Pedersen, "A comparative study on feature selection in text categorization," in Proc. 14th Int. Conf. Mach. Learn., 1997, pp. 412-420.
    • (1997) Proc. 14th Int. Conf. Mach. Learn. , pp. 412-420
    • Yang, Y.1    Pedersen, J.O.2
  • 28
    • 72849109117 scopus 로고    scopus 로고
    • Aligned graph classification with regularized logistic regression
    • B. Quanz and J. Huan, "Aligned graph classification with regularized logistic regression," in Proc. SIAM Int. Conf. Data Mining, 2009, pp. 353-364.
    • (2009) Proc. SIAM Int. Conf. Data Mining , pp. 353-364
    • Quanz, B.1    Huan, J.2
  • 29
    • 84878368035 scopus 로고    scopus 로고
    • Dissecting android malware: Characterization and evolution
    • Y. Zhou and X. Jiang, "Dissecting android malware: Characterization and evolution," in Proc. IEEE Symp. Security Privacy, 2012, pp. 95-109.
    • (2012) Proc. IEEE Symp. Security Privacy , pp. 95-109
    • Zhou, Y.1    Jiang, X.2
  • 30
    • 33646023117 scopus 로고    scopus 로고
    • An introduction to ROC analysis
    • Jun.
    • T. Fawcett, "An introduction to ROC analysis," Pattern Recog. Lett., vol. 27, no. 8, pp. 861-874, Jun. 2006.
    • (2006) Pattern Recog. Lett. , vol.27 , Issue.8 , pp. 861-874
    • Fawcett, T.1
  • 31
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • S. Axelsson, "The base-rate fallacy and the difficulty of intrusion detection," ACM Trans. Inf. Syst. Security, vol. 3, no. 3, pp. 186-205, 2000.
    • (2000) ACM Trans. Inf. Syst. Security , vol.3 , Issue.3 , pp. 186-205
    • Axelsson, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.