Mining permission patterns for contrasting clean and malicious android applications.
Veelasha MoonsamyJia RongShaowu LiuPublished in: Future Gener. Comput. Syst. (2014)
Keyphrases
- pattern mining
- frequent patterns
- interesting patterns
- sequential patterns
- emerging patterns
- data mining techniques
- mining algorithm
- pattern discovery
- previously unknown
- sequential pattern mining
- mining patterns
- transactional data
- periodic patterns
- mining frequent
- valuable knowledge
- multiple data streams
- closed patterns
- frequent pattern mining
- repeating patterns
- data mining
- clickstream data
- knowledge discovery
- web logs
- web mining
- access control
- text mining
- association patterns
- frequent subgraphs
- graph patterns
- concise representation
- discovering interesting
- actionable knowledge
- itemsets
- malicious behavior
- distributed systems
- generalized association rules