Login / Signup
Application of clustering methods for analyzing the security of Android applications.
E. Yu. Pavlenko
A. V. Yarmak
Dmitry A. Moskvin
Published in:
Autom. Control. Comput. Sci. (2017)
Keyphrases
</>
information security
database
learning algorithm
access control
intrusion detection
data sets
databases
security policies