共 50 条
- [31] Detecting Applications with Malicious Behavior in Android Device Based on GA and SVM PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL AND AUTOMATION ENGINEERING (ECAE 2017), 2017, 140 : 257 - 261
- [32] A Software Environment for Confining Malicious Android Applications via Resource Virtualization 2013 18TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS), 2013, : 208 - 211
- [33] Analyzing HTTP-Based Information Exfiltration of Malicious Android Applications 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1642 - 1645
- [34] Assessment of malicious applications using permissions and enhanced user interfaces on Android 2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, 2013, : 270 - 270
- [35] Applying Natural Language Processing for detecting malicious patterns in Android applications FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2021, 39
- [36] Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
- [37] Intelligent identification of malicious behavior in Android applications based on Naive Bayes Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2015, 45 (02): : 224 - 230
- [38] R&R Tool for Android Applications Hiding Malicious Features 37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2022, : 1190 - 1196
- [39] Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and Directions IEEE ACCESS, 2019, 7 : 67602 - 67631
- [40] Discovering Persuaded Risk of Permission in Android Applications for Malicious Application Detection 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 922 - 926