Login / Signup
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System.
Amirhosein Sayyadabdi
Behrouz Tork Ladani
Bahman Zamani
Published in:
CoRR (2022)
Keyphrases
</>
detection algorithm
detection method
false alarms
malware detection
genetic algorithm
mobile devices
object detection
false positives
smart phones
real time
computer vision
automatic detection
detection accuracy
detection scheme