Login / Signup

Android Malicious Code Detection Based on Secondary Pruning Optimization.

Qing YuKuolang MaZuohua Wang
Published in: CISP-BMEI (2019)
Keyphrases
  • malicious code detection
  • real world
  • mobile devices
  • long term
  • intrusion detection
  • false positives and false negatives