共 50 条
- [21] Towards Understanding the Role of Execution Context for Observing Malicious Behavior in Android Malware [J]. E-BUSINESS AND TELECOMMUNICATIONS (ICETE 2016), 2017, 764 : 48 - 71
- [22] An Implemention of a Mechanism for Malicious URLs Detection [J]. PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 1008 - 1013
- [24] Mining permission patterns for contrasting clean and malicious android applications [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 36 : 122 - 132
- [25] Process mining meets malware evolution : a study of the behavior of malicious code [J]. 2016 FOURTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2016, : 616 - 622
- [27] Deep and broad URL feature mining for android malware detection [J]. INFORMATION SCIENCES, 2020, 513 : 600 - 613
- [28] Research on data mining of permissions mode for Android malware detection [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 6): : 13337 - 13350
- [29] Research on data mining of permissions mode for Android malware detection [J]. Cluster Computing, 2019, 22 : 13337 - 13350