Login / Signup
Attack of the Clones: Detecting Cloned Applications on Android Markets.
Jonathan Crussell
Clint Gibler
Hao Chen
Published in:
ESORICS (2012)
Keyphrases
</>
mobile devices
mobile apps
electronic commerce
software systems
source code
automatic detection
smart phones
countermeasures
malicious activities
neural network
case study
m learning
attack detection
detecting malicious
market equilibrium