Author:
Raghuraman Chandni,Suresh Sandhya,Shivshankar Suraj,Chapaneri Radhika
Reference19 articles.
1. Tupakula, U., Varadharajan, V., Akku, N.: Intrusion detection techniques for infrastructure as a service cloud. In: Ninth IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 744–751. IEEE (2011)
2. Mcafee.com.: McAfee Labs Threats Report (online) (2018). Available at:
https://www.mcafee.com/enterprise/en-us/assets/reports/rp-quarterly-threats-dec-2018.pdf
. Accessed 3 Feb. 2019
3. KOÇ, U.: Introduction to Android Malware Analysis. (Blog) Uceka (2013). Available at:
https://uceka.com/2013/08/06/introduction-to-android-malware-analysis/
. Accessed 18 Dec. 2018
4. Sahs, J., Khan, L.: A machine learning approach to android malware detection. In: European Intelligence and Security Informatics Conference, pp. 141–147. IEEE Computer Society (2012)
5. Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., Siemens, C.E.R.T.: Drebin: effective and explainable detection of android malware in your pocket. In: Ndss, vol. 14, pp. 23–26 (2014)
Cited by
24 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献