Login / Signup
Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems.
Anis Bkakria
Mariem Graa
Nora Cuppens-Boulahia
Frédéric Cuppens
Jean-Louis Lanet
Published in:
ICISS (2017)
Keyphrases
</>
mobile devices
management system
detection method
malware detection
computer systems
detection algorithm
retrieval systems
countermeasures
neural network
data mining
distributed systems
false positives
detection rate
mobile platforms