Login / Signup
Identifying android malicious repackaged applications by thread-grained system call sequences.
Ying-Dar Lin
Yuan-Cheng Lai
Chien-Hung Chen
Hao-Chuan Tsai
Published in:
Comput. Secur. (2013)
Keyphrases
</>
intrusion detection
finite automata
fine grained
intrusion detection system
data mining
anomaly detection
mobile devices
detect malicious
information systems
self organizing maps
network security
malicious users