Mining nested flow of dominant APIs for detecting android malware.
Shahid AlamSoltan Abed AlharbiSerdar YildirimPublished in: Comput. Networks (2020)
Keyphrases
- malware detection
- detect malicious
- data mining
- flow field
- lightweight
- text mining
- knowledge discovery
- source code
- database
- web mining
- mobile devices
- open source
- data mining techniques
- itemsets
- intrusion detection
- frequent patterns
- sequential patterns
- data mining methods
- mobile applications
- location aware
- social networks
- databases