Login / Signup
Assessment of malicious applications using permissions and enhanced user interfaces on Android.
Sangho Lee
Da Young Ju
Published in:
ISI (2013)
Keyphrases
</>
user interface
detect malicious
access control
mobile devices
malware detection
human computer interaction
end users
malicious attacks
api calls
user friendly
mobile applications
mobile platforms
assessment process
expert systems
design principles
security model
malicious code