Login / Signup
Android Malicious Code Detection Based on Secondary Pruning Optimization.
Qing Yu
Kuolang Ma
Zuohua Wang
Published in:
CISP-BMEI (2019)
Keyphrases
</>
malicious code detection
real world
mobile devices
long term
intrusion detection
false positives and false negatives