메뉴 건너뛰기




Volumn , Issue 1, 2014, Pages 1025-1035

Checking app behavior against app descriptions

Author keywords

Android; clustering; description analysis; malware detection

Indexed keywords

APPLICATION PROGRAMMING INTERFACES (API); COMPUTER CRIME; MALWARE; SOFTWARE ENGINEERING;

EID: 84993660403     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2568225.2568276     Document Type: Conference Paper
Times cited : (370)

References (28)
  • 13
    • 84953744816 scopus 로고
    • A statistical interpretation of term specificity and its application in retrieval
    • K. S. Jones. A statistical interpretation of term specificity and its application in retrieval. Journal of Documentation, 28 (1): 11-21, 1972.
    • (1972) Journal of Documentation , vol.28 , Issue.1 , pp. 11-21
    • Jones, K.S.1
  • 14
    • 84867459428 scopus 로고    scopus 로고
    • Expectation and purpose: Understanding users' mental models of mobile app privacy through crowdsourcing
    • New York, NY, USA. ACM
    • J. Lin, S. Amini, J. I. Hong, N. Sadeh, J. Lindqvist, and J. Zhang. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. In ACM Conference on Ubiquitous Computing (UbiComp), pages 501-510, New York, NY, USA, 2012. ACM.
    • (2012) ACM Conference on Ubiquitous Computing (UbiComp) , pp. 501-510
    • Lin, J.1    Amini, S.2    Hong, J.I.3    Sadeh, N.4    Lindqvist, J.5    Zhang, J.6
  • 16
    • 0001457509 scopus 로고
    • Some methods for classification and analysis of multivariate observations
    • University of California Press L. M. L. Cam and J. Neyman, editors
    • J. B. MacQueen. Some methods for classification and analysis of multivariate observations. In L. M. L. Cam and J. Neyman, editors, Berkeley Symposium on Mathematical Statistics and Probability, volume 1, pages 281-297. University of California Press, 1967.
    • (1967) Berkeley Symposium on Mathematical Statistics and Probability, Volume 1 , pp. 281-297
    • MacQueen, J.B.1
  • 19
    • 85019170256 scopus 로고    scopus 로고
    • WHYPER: Towards automating risk assessment of mobile applications
    • R. Pandita, X. Xiao, W. Yang, W. Enck, and T. Xie. WHYPER: Towards automating risk assessment of mobile applications. In USENIX Security Symposium, pages 527-542, 2013.
    • (2013) USENIX Security Symposium , pp. 527-542
    • Pandita, R.1    Xiao, X.2    Yang, W.3    Enck, W.4    Xie, T.5
  • 21
    • 0023453329 scopus 로고
    • Silhouettes: A graphical aid to the interpretation and validation of cluster analysis
    • P. Rousseeuw. Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. Journal of Computational and Applied Mathematics, 20 (1): 53-65, 1987.
    • (1987) Journal of Computational and Applied Mathematics , vol.20 , Issue.1 , pp. 53-65
    • Rousseeuw, P.1
  • 28
    • 84878368035 scopus 로고    scopus 로고
    • Dissecting Android malware: Characterization and evolution
    • Washington, DC, USA. IEEE Computer Society
    • Y. Zhou and X. Jiang. Dissecting Android malware: Characterization and evolution. In IEEE Symposium on Security and Privacy (SP), pages 95-109, Washington, DC, USA, 2012. IEEE Computer Society.
    • (2012) IEEE Symposium on Security and Privacy (SP) , pp. 95-109
    • Zhou, Y.1    Jiang, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.