Login / Signup
Stealth attacks: An extended insight into the obfuscation effects on Android malware.
Davide Maiorca
Davide Ariu
Igino Corona
Marco Aresu
Giorgio Giacinto
Published in:
Comput. Secur. (2015)
Keyphrases
</>
malware detection
anti virus
detect malicious
static analysis
reverse engineering
malicious code
anomaly detection
control flow
detecting malicious
watermarking scheme
attack detection
ddos attacks
java card
mobile devices
terrorist attacks
attack scenarios
data mining