Author:
Batouche Ali,Jahankhani Hamid
Publisher
Springer International Publishing
Reference19 articles.
1. Anderson JP (1980) Computer security threat monitoring and surveillance. Technical Report, James P. Anderson Company: Philadelphia, PA, USA
2. Liu H, Lang B (2019) Machine learning and deep learning methods for intrusion detection systems: a survey. Appl Sci 9(20):4396. https://www.mdpi.com/2076-3417/9/20/4396
3. Alzaylaee M, Yerima S, Sezer S (2020) DL-Droid: Deep learning based android malware detection using real devices. Comput Secur 89:101663
4. Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Venkatraman S (2019) Robust intelligent malware detection using deep learning. IEEE Access 7:46717–46738. https://doi.org/10.1109/ACCESS.2019.2906934
5. Darwin I (2017) Android cookbook. O'Reilly Media, Sebastopol, CA
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献