Login / Signup

Contrasting Permission Patterns between Clean and Malicious Android Applications.

Veelasha MoonsamyJia RongShaowu LiuGang LiLynn Margaret Batten
Published in: SecureComm (2013)
Keyphrases
  • data sets
  • databases
  • neural network
  • artificial intelligence
  • pattern analysis
  • previously unknown
  • malicious behavior
  • information retrieval
  • knowledge base
  • case study
  • spatio temporal