Author:
Narudin Fairuz Amalina,Feizollah Ali,Anuar Nor Badrul,Gani Abdullah
Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Reference66 articles.
1. Amos B, Turner H, White J (2013) Applying machine learning classifiers to dynamic android malware detection at scale. In: Proceedings of the 9th international wireless communications and mobile computing conference (IWCMC), Sardinia, Italy, pp 1666–1671
2. Android (2013) Android 4.2, Jelly Bean. http://www.android.com/about/jelly-bean/ . Accessed June 2013
3. Anuar NB, Sallehudin H, Gani A, Zakaria O (2008) Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree. Malays J Comput Sci 21(2):101–115
4. Anubis (2013) Anubis: analyzing unknown binaries. http://anubis.iseclab.org/ . Accessed Feb 2013
5. Arp D, Spreitzenbarth M, Hubner M, Gascon H, Rieck K (2014) DREBIN: effective and explainable detection of android malware in your pocket. In: Proceedings of the 2014 network and distributed system security (NDSS) symposium, San Diego, USA (2014)
Cited by
276 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献