Author:
Meng Xin,Spanoudakis George
Publisher
Springer International Publishing
Reference37 articles.
1. Lecture Notes in Computer Science;T Alpcan,2010
2. Batyuk, L., Herpich, M.: Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications. In: 2011 6th International Conference Malicious Unwanted Software, pp. 66–72 (2011)
3. Bhargava, D., et al.: Decision tree analysis on j48 algorithm for data mining. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(6), 1114–1119 (2013)
4. Bläsing, T., et al.: An android application sandbox system for suspicious software detection. In: Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software, pp. 55–62 (2010)
5. Boland, M.V., Murphy, R.F.: A neural network classifier capable of recognizing the patterns of all major subcellular structures in fluorescence microscope images of HeLa cells. Bioinformatics 17(12), 1213–1223 (2001)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献