Search Results

There are 7865 results for: content related to: Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)

  1. DroidScreening: a practical framework for real-world Android malware analysis

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1435–1449, Junfeng Yu, Qingfeng Huang and CheeHoo Yian

    Version of Record online : 10 FEB 2016, DOI: 10.1002/sec.1430

  2. Smart malware detection on Android

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4254–4272, Laura Gheorghe, Bogdan Marin, Gary Gibson, Lucian Mogosanu, Razvan Deaconescu, Valentin-Gabriel Voiculescu and Mihai Carabas

    Version of Record online : 1 SEP 2015, DOI: 10.1002/sec.1340

  3. AndroGenerator: An automated and configurable android app network traffic generation system

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4273–4288, Xin Su, Dafang Zhang, Wenjia Li and Xiaofei Wang

    Version of Record online : 15 SEP 2015, DOI: 10.1002/sec.1341

  4. Guess who is listening in to the board meeting: on the use of mobile device applications as roving spy bugs

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2813–2825, Zahid Anwar and Waqas Ahmad Khan

    Version of Record online : 9 FEB 2015, DOI: 10.1002/sec.1205

  5. An effective behavior-based Android malware detection system

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2079–2089, Shihong Zou, Jing Zhang and Xiaodong Lin

    Version of Record online : 21 NOV 2014, DOI: 10.1002/sec.1155

  6. Taming transitive permission attack via bytecode rewriting on Android application

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 2100–2114, Daibin Wang, Hai Jin, Deqing Zou, Peng Xu, Tianqing Zhu and Gang Chen

    Version of Record online : 22 FEB 2016, DOI: 10.1002/sec.1466

  7. TSSDroid: realization of an efficient and usable TSS API for the Android software stack

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1553–1576, Sohail Khan, Mohammad Nauman, Abu Talib Othman, Shahrulniza Musa and Toqeer Ali Syed

    Version of Record online : 11 FEB 2016, DOI: 10.1002/sec.1448

  8. An enhanced security framework for reliable Android operating system

    Security and Communication Networks

    Volume 9, Issue 6, April 2016, Pages: 528–534, Jong Hyuk Park, Dohyun Kim, Ji Soo Park and Sangjin Lee

    Version of Record online : 13 NOV 2013, DOI: 10.1002/sec.908

  9. PaddyFrog: systematically detecting confused deputy vulnerability in Android applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2338–2349, Jianliang Wu, Tingting Cui, Tao Ban, Shanqing Guo and Lizhen Cui

    Version of Record online : 30 JAN 2015, DOI: 10.1002/sec.1179

  10. Semantically rich application-centric security in Android

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 658–673, Machigar Ongtang, Stephen McLaughlin, William Enck and Patrick McDaniel

    Version of Record online : 23 AUG 2011, DOI: 10.1002/sec.360

  11. Detect repackaged Android application based on HTTP traffic similarity

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2257–2266, Xueping Wu, Dafang Zhang, Xin Su and WenWei Li

    Version of Record online : 7 FEB 2015, DOI: 10.1002/sec.1170

  12. A static Android malicious code detection method based on multi-source fusion

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3238–3246, Yao Du, Xiaoqing Wang and Junfeng Wang

    Version of Record online : 30 MAR 2015, DOI: 10.1002/sec.1248

  13. Realization of a user-centric, privacy preserving permission framework for Android

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 368–382, Mohammad Nauman, Sohail Khan, Abu Talib Othman and Shahrulniza Musa

    Version of Record online : 21 MAR 2014, DOI: 10.1002/sec.986

  14. Cross-layer resource control and scheduling for improving interactivity in Android

    Software: Practice and Experience

    Volume 45, Issue 11, November 2015, Pages: 1549–1570, Sungju Huh, Jonghun Yoo and Seongsoo Hong

    Version of Record online : 11 AUG 2014, DOI: 10.1002/spe.2285

  15. Generative versus discriminative classifiers for android anomaly-based detection system using system calls filtering and abstraction process

    Security and Communication Networks

    Abdelfattah Amamra, Jean-Marc Robert, Andrien Abraham and Chamseddine Talhi

    Version of Record online : 18 JUL 2016, DOI: 10.1002/sec.1555

  16. Detection of repackaged mobile applications through a collaborative approach

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 11, 10 August 2015, Pages: 2818–2838, Alessandro Aldini, Fabio Martinelli, Andrea Saracino and Daniele Sgandurra

    Version of Record online : 28 NOV 2014, DOI: 10.1002/cpe.3447

  17. Identifying Android malware with system call co-occurrence matrices

    Transactions on Emerging Telecommunications Technologies

    Volume 27, Issue 5, May 2016, Pages: 675–684, Xi Xiao, Xianni Xiao, Yong Jiang, Xuejiao Liu and Runguo Ye

    Version of Record online : 3 FEB 2016, DOI: 10.1002/ett.3016

  18. What you see predicts what you get—lightweight agent-based malware detection

    Security and Communication Networks

    Volume 6, Issue 1, January 2013, Pages: 33–48, Wei Wang, Ilona Murynets, Jeffrey Bickford, Christopher Van Wart and Gang Xu

    Version of Record online : 18 APR 2012, DOI: 10.1002/sec.528

  19. Enhancing malware detection for Android systems using a system call filtering and abstraction process

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1179–1192, Abdelfattah Amamra, Jean-Marc Robert and Chamseddine Talhi

    Version of Record online : 21 JUL 2014, DOI: 10.1002/sec.1073

  20. Context data distribution with quality guarantees for Android-based mobile systems

    Security and Communication Networks

    Volume 6, Issue 4, April 2013, Pages: 450–460, Antonio Corradi, Mario Fanelli, Luca Foschini and Marcello Cinque

    Version of Record online : 27 DEC 2012, DOI: 10.1002/sec.633