Sign in

Identifying android malicious repackaged applications by thread-grained system call sequences.

Ying-Dar LinYuan-Cheng LaiChien-Hung ChenHao-Chuan Tsai
Published in: Comput. Secur. (2013)
Keyphrases
  • intrusion detection
  • finite automata
  • fine grained
  • intrusion detection system
  • data mining
  • anomaly detection
  • mobile devices
  • detect malicious
  • information systems
  • self organizing maps
  • network security
  • malicious users