Search Results

There are 3774 results for: content related to: Enhancing malware detection for Android systems using a system call filtering and abstraction process

  1. Using HTML5 to prevent detection of drive-by-download web malware

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1237–1255, Alfredo De Santis, Giancarlo De Maio and Umberto Ferraro Petrillo

    Version of Record online : 21 AUG 2014, DOI: 10.1002/sec.1077

  2. Smart malware detection on Android

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4254–4272, Laura Gheorghe, Bogdan Marin, Gary Gibson, Lucian Mogosanu, Razvan Deaconescu, Valentin-Gabriel Voiculescu and Mihai Carabas

    Version of Record online : 1 SEP 2015, DOI: 10.1002/sec.1340

  3. Mathematical modeling of the propagation of malware: a review

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2561–2579, Angel Martín del Rey

    Version of Record online : 28 JAN 2015, DOI: 10.1002/sec.1186

  4. Improving malware detection using multi-view ensemble learning

    Security and Communication Networks

    Jinrong Bai and Junfeng Wang

    Version of Record online : 24 AUG 2016, DOI: 10.1002/sec.1600

  5. DroidScreening: a practical framework for real-world Android malware analysis

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1435–1449, Junfeng Yu, Qingfeng Huang and CheeHoo Yian

    Version of Record online : 10 FEB 2016, DOI: 10.1002/sec.1430

  6. DLLMiner: structural mining for malware detection

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3311–3322, Masoud Narouei, Mansour Ahmadi, Giorgio Giacinto, Hassan Takabi and Ashkan Sami

    Version of Record online : 22 APR 2015, DOI: 10.1002/sec.1255

  7. A static Android malicious code detection method based on multi-source fusion

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3238–3246, Yao Du, Xiaoqing Wang and Junfeng Wang

    Version of Record online : 30 MAR 2015, DOI: 10.1002/sec.1248

  8. JSOD: JavaScript obfuscation detector

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 1092–1107, Ismail Adel AL-Taharwa, Hahn-Ming Lee, Albert B. Jeng, Kuo-Ping Wu, Cheng-Seen Ho and Shyi-Ming Chen

    Version of Record online : 1 JUL 2014, DOI: 10.1002/sec.1064

  9. Generative versus discriminative classifiers for android anomaly-based detection system using system calls filtering and abstraction process

    Security and Communication Networks

    Abdelfattah Amamra, Jean-Marc Robert, Andrien Abraham and Chamseddine Talhi

    Version of Record online : 18 JUL 2016, DOI: 10.1002/sec.1555

  10. A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks.

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2171–2188, Hailun Tan, Wen Hu and Sanjay Jha

    Version of Record online : 28 JAN 2015, DOI: 10.1002/sec.1162

  11. AndroGenerator: An automated and configurable android app network traffic generation system

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4273–4288, Xin Su, Dafang Zhang, Wenjia Li and Xiaofei Wang

    Version of Record online : 15 SEP 2015, DOI: 10.1002/sec.1341

  12. Understanding a prospective approach to designing malicious social bots

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 2157–2172, Yukun He, Guangyan Zhang, Jie Wu and Qiang Li

    Version of Record online : 24 FEB 2016, DOI: 10.1002/sec.1475

  13. Design and implementation of a malware detection system based on network behavior

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 459–470, L. Xue and G. Sun

    Version of Record online : 9 JUN 2014, DOI: 10.1002/sec.993

  14. Metamorphic malware detection using base malware identification approach

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1719–1733, Devendra Kumar Mahawer and A. Nagaraju

    Version of Record online : 6 NOV 2013, DOI: 10.1002/sec.869

  15. Taming transitive permission attack via bytecode rewriting on Android application

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 2100–2114, Daibin Wang, Hai Jin, Deqing Zou, Peng Xu, Tianqing Zhu and Gang Chen

    Version of Record online : 22 FEB 2016, DOI: 10.1002/sec.1466

  16. TSSDroid: realization of an efficient and usable TSS API for the Android software stack

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1553–1576, Sohail Khan, Mohammad Nauman, Abu Talib Othman, Shahrulniza Musa and Toqeer Ali Syed

    Version of Record online : 11 FEB 2016, DOI: 10.1002/sec.1448

  17. Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 626–640, Ying-Dar Lin, Tzung-Bi Shih, Yu-Sung Wu and Yuan-Cheng Lai

    Version of Record online : 21 MAR 2013, DOI: 10.1002/sec.764

  18. Detect repackaged Android application based on HTTP traffic similarity

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2257–2266, Xueping Wu, Dafang Zhang, Xin Su and WenWei Li

    Version of Record online : 7 FEB 2015, DOI: 10.1002/sec.1170

  19. Agent-based modeling of malware dynamics in heterogeneous environments

    Security and Communication Networks

    Volume 6, Issue 12, December 2013, Pages: 1576–1589, Abhijit Bose and Kang G. Shin

    Version of Record online : 25 FEB 2011, DOI: 10.1002/sec.298

  20. Three-phase behavior-based detection and classification of known and unknown malware

    Security and Communication Networks

    Volume 8, Issue 11, 25 July 2015, Pages: 2004–2015, Ying-Dar Lin, Yuan-Cheng Lai, Chun-Nan Lu, Peng-Kai Hsu and Chia-Yin Lee

    Version of Record online : 8 JAN 2015, DOI: 10.1002/sec.1148