Login / Signup

Application of clustering methods for analyzing the security of Android applications.

E. Yu. PavlenkoA. V. YarmakDmitry A. Moskvin
Published in: Autom. Control. Comput. Sci. (2017)
Keyphrases
  • information security
  • database
  • learning algorithm
  • access control
  • intrusion detection
  • data sets
  • databases
  • security policies