Login / Signup
Capturing Android Malware Behaviour Using System Flow Graph.
Radoniaina Andriatsimandefitra
Valérie Viet Triem Tong
Published in:
NSS (2014)
Keyphrases
</>
flow graph
malware detection
flow graphs
random walk
shortest path
information flow
mobile devices
detect malicious
anomaly detection
reverse engineering
location aware
decision table
control flow
user behaviour
mobile platforms
mobile apps
social networks
markov chain
pattern recognition