Automated identification of installed malicious Android applications.
Mark D. GuidoJared OndricekJustin GroverDavid WilburnThanh NguyenAndrew HuntPublished in: Digit. Investig. (2013)
Keyphrases
- data driven
- automated analysis
- malicious behavior
- semi automated
- automatic identification
- computer assisted
- semi automatic
- previously identified
- real time
- person identification
- fully automated
- computer aided
- fully automatic
- medical images
- evolutionary algorithm
- digital libraries
- image sequences
- three dimensional
- website
- decision making
- information retrieval
- databases