Permission Request Pattern Recognition in Android Malware Applications.
Ahmed Ben AyedPublished in: Int. J. Strateg. Inf. Technol. Appl. (2017)
Keyphrases
- pattern recognition
- malware detection
- api calls
- computer vision
- access control
- image processing
- feature extraction
- mobile devices
- anomaly detection
- machine learning
- pattern recognition problems
- neural network
- detect malicious
- signal processing
- fuzzy sets
- third party
- pattern classification
- reverse engineering
- image analysis
- dimensionality reduction
- graph matching
- smart phones
- mobile applications
- pattern analysis
- security policies
- mobile platform
- face recognition