Login / Signup
Leveraging application permissions and network traffic attributes for Android ransomware detection.
Sekione Reward Jeremiah
Haotian Chen
Stefanos Gritzalis
Jong Hyuk Park
Published in:
J. Netw. Comput. Appl. (2024)
Keyphrases
</>
network traffic
anomaly detection
intrusion detection
detecting anomalous
detection algorithm
computer networks
network monitoring
network security
active learning
probabilistic model
intrusion detection system
traffic analysis