Login / Signup
Analysis of Malicious and Benign Android Applications.
Moutaz Alazab
Veelasha Moonsamy
Lynn Margaret Batten
Patrik Lantz
Ronghua Tian
Published in:
ICDCS Workshops (2012)
Keyphrases
</>
data analysis
statistical analysis
quantitative analysis
databases
hidden markov models
wireless sensor networks
intrusion detection
cd rom