Login / Signup
Method of Fraudster Fingerprint Formation During Mobile Application Installations.
Tetiana Polhul
Andrii Yarovyi
Published in:
IDAACS (2019)
Keyphrases
</>
detection method
significant improvement
mobile applications
cost function
preprocessing
computational complexity
objective function
dynamic programming
computational cost
probabilistic model
segmentation method
pairwise
mobile devices
neural network
feature set
decision trees
data mining