咨询与建议

限定检索结果

文献类型

  • 128 篇 期刊文献
  • 86 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 216 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 206 篇 工学
    • 186 篇 计算机科学与技术...
    • 70 篇 电气工程
    • 55 篇 信息与通信工程
    • 38 篇 软件工程
    • 13 篇 控制科学与工程
    • 5 篇 网络空间安全
    • 3 篇 仪器科学与技术
    • 2 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 石油与天然气工程
  • 19 篇 管理学
    • 16 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 理学
    • 10 篇 化学
    • 3 篇 生物学
    • 2 篇 数学
  • 3 篇 农学
    • 3 篇 水产
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学

主题

  • 216 篇 android malware ...
  • 62 篇 machine learning
  • 30 篇 deep learning
  • 29 篇 static analysis
  • 19 篇 feature extracti...
  • 17 篇 mobile security
  • 15 篇 malware
  • 11 篇 feature selectio...
  • 9 篇 graph neural net...
  • 9 篇 function call gr...
  • 7 篇 classification
  • 6 篇 ensemble learnin...
  • 5 篇 malware classifi...
  • 5 篇 adversarial mach...
  • 5 篇 semantics
  • 5 篇 smart phones
  • 5 篇 codes
  • 5 篇 security
  • 5 篇 artificial intel...
  • 5 篇 training

机构

  • 5 篇 chinese acad sci...
  • 5 篇 univ chinese aca...
  • 4 篇 univ elect sci &...
  • 3 篇 univ sci & techn...
  • 3 篇 beijing univ tec...
  • 3 篇 harbin inst tech...
  • 3 篇 sichuan univ sch...
  • 3 篇 southwest univ s...
  • 3 篇 beijing univ pos...
  • 3 篇 west virginia un...
  • 2 篇 shandong prov ke...
  • 2 篇 hong kong polyte...
  • 2 篇 cheikh anta diop...
  • 2 篇 natl taiwan univ...
  • 2 篇 tsinghua univ de...
  • 2 篇 shandong univ pe...
  • 2 篇 fujian normal un...
  • 2 篇 univ basque coun...
  • 2 篇 univ basque coun...
  • 2 篇 xinjiang univ sc...

作者

  • 5 篇 ye yanfang
  • 5 篇 hou shifu
  • 4 篇 yuan wei
  • 4 篇 ouya samuel
  • 4 篇 zhu dali
  • 4 篇 vinod p.
  • 4 篇 zhang yiming
  • 3 篇 xue jingfeng
  • 3 篇 nazir ahsan
  • 3 篇 wajahat ahsan
  • 3 篇 wang ruoyu
  • 3 篇 chen zhenxiang
  • 3 篇 moonsamy veelash...
  • 3 篇 ge xiuting
  • 3 篇 mahmood tariq
  • 3 篇 li heng
  • 3 篇 conti mauro
  • 3 篇 luo xiapu
  • 3 篇 sezer sakir
  • 3 篇 bostani hamid

语言

  • 215 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=Android Malware Detection"
216 条 记 录,以下是21-30 订阅
排序:
android malware detection by Correlated Real Permission Couples Using FP Growth Algorithm and Neural Networks
收藏 引用
IEEE ACCESS 2023年 11卷 124996-125010页
作者: Banik, Abhinandan Singh, Jyoti Prakash Natl Inst Technol Patna Patna 800005 India
In the current internet era, where mobile devices are ubiquitous and often hold sensitive personal and corporate data, android malware analysis is crucial to protect against the increasing sophistication and prevalenc... 详细信息
来源: 评论
android malware detection method based on naive Bayes and permission correlation algorithm
收藏 引用
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS 2018年 第1期21卷 955-966页
作者: Shang, Fengjun Li, Yalin Deng, Xiaolin He, Dexiang Chongqing Univ Posts & Telecommun Coll Comp Sci & Technol Chongqing 400065 Peoples R China
In order to detect android malware more effectively, an android malware detection model was proposed based on improved naive Bayes classification. Firstly, considering the unknown permission that may be malicious in d... 详细信息
来源: 评论
android malware detection: Investigating the impact of imbalanced data-sets on the performance of machine learning models.  24
Android malware detection: Investigating the impact of imbal...
收藏 引用
24th International Conference on Advanced Communication Technology (ICACT) - Artificial Intelligence Technologies toward Cybersecurity
作者: Sawadogo, Zakaria Mendy, Gervais Dembele, Jean Marie Ouya, Samuel Univ Cheikh Anta Diop Dakar LITA Lab Informat Telecommun & Applicat Dakar Senegal Univ Gaston Berger LANI Lab Anal Numer & Informat Dakar Senegal
Artificial intelligence has revolutionized many areas of research, including research on malicious application detection and classification. Nowadays, there are many approaches that learn from existing data and predic... 详细信息
来源: 评论
android malware detection Using Local Binary Pattern and Principal Component Analysis  3rd
Android Malware Detection Using Local Binary Pattern and Pri...
收藏 引用
3rd International Conference of Pioneering Computer Scientists, Engineers and Educators (ICPCSEE)
作者: Wu, Qixin Qin, Zheng Zhang, Jinxin Yin, Hui Yang, Guangyi Hu, Kuangsheng Hunan Univ Coll Comp Sci & Elect Engn Changsha Hunan Peoples R China Hunan Key Lab Big Data Res & Applicat Changsha Hunan Peoples R China Hunan Inst Metrol & Test Changsha Hunan Peoples R China
Nowadays, analysis methods based on big data have been widely used in malicious software detection. Since android has become the dominator of smartphone operating system market, the number of android malicious applica... 详细信息
来源: 评论
android malware detection: Feature Update Using Incremental Learning Approach: Further Investigation of UFILA  25
Android Malware Detection: Feature Update Using Incremental ...
收藏 引用
25th International Conference on Advanced Communication Technology (ICACT) - New Cyber Security Risks for Enterprise Amidst COVID-19 Pandemic
作者: Degrees, Zakaria Sawadogo Dembele, Jean-Marie Degrees, Gervais Mendy Ouya, Samuel Cheikh Anta Diop Univ LITA Lab Comp Sci Telecommun & Applicat Dakar Senegal Gaston Berger Univ LANI Lab Numer Anal & Comp Sci Dakar Senegal
Several kinds of mobile applications are available on platforms offering various services to users. Both malware and good applications are found in software repositories, which is a major cybersecurity problem. To add... 详细信息
来源: 评论
android malware detection: An in-depth investigation of the impact of the use of imbalance datasets on the efficiency of machine learning models  25
Android malware detection: An in-depth investigation of the ...
收藏 引用
25th International Conference on Advanced Communication Technology (ICACT) - New Cyber Security Risks for Enterprise Amidst COVID-19 Pandemic
作者: Degrees, Zakaria Sawadogo Dembele, Jean-Marie Degrees, Gervais Mendy Ouya, Samuel Cheikh Anta Diop Univ LITA Lab Comp Sci Telecommun & Applicat Dakar Senegal Gaston Berger Univ LANI Lab Numer Anal & Comp Sci Dakar Senegal Gaston Berger Univ Dakar Senegal Univ Cheikh Anta Diop ESP Polytechn Sch Dakar Senegal Gaston Berger Univ Comp Sci Dakar Senegal
Machine learning techniques have become an essential part of research into the detection and classification of malicious applications. There are several approaches or algorithms that learn from existing data and predi... 详细信息
来源: 评论
android malware detection and identification frameworks by leveraging the machine and deep learning techniques: A comprehensive review
收藏 引用
TELEMATICS AND INFORMATICS REPORTS 2024年 14卷
作者: Smmarwar, Santosh K. Gupta, Govind P. Kumar, Sanjay Natl Inst Technol Dept Informat Technol Raipur 492010 India
The ever-increasing growth of online services and smart connectivity of devices have posed the threat of malware to computer system, android-based smart phones, Internet of Things (IoT)-based systems. The anti-malware... 详细信息
来源: 评论
android malware detection using Convolutional Deep Neural Networks  4
Android Malware Detection using Convolutional Deep Neural Ne...
收藏 引用
4th International Conference on Advanced Aspects of Software Engineering (ICAASE)
作者: Bourebaa, Fatima Benmohammed, Mohamed Univ Constantine 2 Abdelhamid Mehri Lire Lab Constantine Algeria
Deep learning in general and convolutional architectures, in particular, have pushed the limits of the current state of the art in the field of computer vision and the processing of natural languages and speech. Recen... 详细信息
来源: 评论
android malware detection BASED ON HETEROGENEOUS INFORMATION NETWORK WITH CROSS-LAYER FEATURES  19
ANDROID MALWARE DETECTION BASED ON HETEROGENEOUS INFORMATION...
收藏 引用
19th IEEE International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)
作者: Ren Xixuan Zhao Lirui Wang Kai Xue Zhixing Hou Anran Shao Qiao Univ Elect Sci & Technol China Sch Comp Sci & Engn Chengdu 611731 Peoples R China
As a mature and open mobile operating system, android runs on many IoT devices, which has led to android-based IoT devices have become a hotbed of malware. Existing static detection methods for malware using artificia... 详细信息
来源: 评论
android malware detection based on multi-category and tag level ratio  5
Android malware detection based on multi-category and tag le...
收藏 引用
IEEE 5th Information Technology and Mechatronics Engineering Conference (ITOEC)
作者: Yang, Zongjing Long, Zhaohua Chongqing Univ Posts & Telecommun Sch Comp Sci & Technol Chongqing 400000 Peoples R China
The arrival of the mobile platforms has brought much convenience to our life, people start to get used to social events, online shopping, and business activities with mobile phones, especially those with the android s... 详细信息
来源: 评论