Login / Signup
Contrasting Permission Patterns between Clean and Malicious Android Applications.
Veelasha Moonsamy
Jia Rong
Shaowu Liu
Gang Li
Lynn Margaret Batten
Published in:
SecureComm (2013)
Keyphrases
</>
data sets
databases
neural network
artificial intelligence
pattern analysis
previously unknown
malicious behavior
information retrieval
knowledge base
case study
spatio temporal