Sign in

Analysis of Malicious and Benign Android Applications.

Moutaz AlazabVeelasha MoonsamyLynn Margaret BattenPatrik LantzRonghua Tian
Published in: ICDCS Workshops (2012)
Keyphrases
  • data analysis
  • statistical analysis
  • quantitative analysis
  • databases
  • hidden markov models
  • wireless sensor networks
  • intrusion detection
  • cd rom