共 50 条
- [2] Discovering Persuaded Risk of Permission in Android Applications for Malicious Application Detection [J]. 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 922 - 926
- [4] Detection of Malicious Network Traffic Attacks Using Support Vector Machine [J]. ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2023, PT II, 2024, 2091 : 54 - 68
- [5] Android Malicious Application Detection Using Support Vector Machine and Active Learning [J]. 2017 13TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2017,
- [6] Malicious Application Traffic Detection and Identification for Mobile Android Devices [J]. INFORMATICA-AN INTERNATIONAL JOURNAL OF COMPUTING AND INFORMATICS, 2022, 46 (08): : 67 - 72
- [7] Malicious Application Traffic Detection and Identification for Mobile Android Devices [J]. Informatica (Slovenia), 2022, 46 (08): : 67 - 72
- [9] Detection of malicious behavior in android apps through API calls and permission uses analysis [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (19):
- [10] Hybrid Detection Using Permission Analysis for Android Malware [J]. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 541 - 545