咨询与建议

限定检索结果

文献类型

  • 124 篇 期刊文献
  • 87 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 213 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 203 篇 工学
    • 183 篇 计算机科学与技术...
    • 67 篇 电气工程
    • 54 篇 信息与通信工程
    • 39 篇 软件工程
    • 14 篇 控制科学与工程
    • 6 篇 网络空间安全
    • 3 篇 仪器科学与技术
    • 2 篇 机械工程
    • 2 篇 石油与天然气工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
  • 20 篇 管理学
    • 16 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
    • 1 篇 公共管理
  • 13 篇 理学
    • 10 篇 化学
    • 3 篇 数学
    • 3 篇 生物学
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 1 篇 农学
    • 1 篇 水产

主题

  • 213 篇 android malware ...
  • 62 篇 machine learning
  • 30 篇 deep learning
  • 29 篇 static analysis
  • 18 篇 feature extracti...
  • 17 篇 mobile security
  • 14 篇 malware
  • 11 篇 feature selectio...
  • 9 篇 function call gr...
  • 8 篇 graph neural net...
  • 7 篇 classification
  • 6 篇 ensemble learnin...
  • 5 篇 malware classifi...
  • 5 篇 semantics
  • 5 篇 smart phones
  • 5 篇 codes
  • 5 篇 artificial intel...
  • 5 篇 training
  • 5 篇 convolutional ne...
  • 5 篇 dynamic analysis

机构

  • 5 篇 chinese acad sci...
  • 5 篇 univ chinese aca...
  • 3 篇 univ sci & techn...
  • 3 篇 beijing univ tec...
  • 3 篇 harbin inst tech...
  • 3 篇 southwest univ s...
  • 3 篇 beijing univ pos...
  • 3 篇 univ elect sci &...
  • 3 篇 west virginia un...
  • 2 篇 shandong prov ke...
  • 2 篇 hong kong polyte...
  • 2 篇 cheikh anta diop...
  • 2 篇 natl taiwan univ...
  • 2 篇 tsinghua univ de...
  • 2 篇 shandong univ pe...
  • 2 篇 fujian normal un...
  • 2 篇 univ basque coun...
  • 2 篇 univ basque coun...
  • 2 篇 xinjiang univ sc...
  • 2 篇 south china univ...

作者

  • 5 篇 ye yanfang
  • 5 篇 hou shifu
  • 4 篇 yuan wei
  • 4 篇 ouya samuel
  • 4 篇 zhu dali
  • 4 篇 vinod p.
  • 4 篇 zhang yiming
  • 3 篇 xue jingfeng
  • 3 篇 nazir ahsan
  • 3 篇 wajahat ahsan
  • 3 篇 wang ruoyu
  • 3 篇 chen zhenxiang
  • 3 篇 ge xiuting
  • 3 篇 mahmood tariq
  • 3 篇 li heng
  • 3 篇 conti mauro
  • 3 篇 luo xiapu
  • 3 篇 sezer sakir
  • 3 篇 liu zhen
  • 3 篇 wu di

语言

  • 211 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"主题词=Android Malware Detection"
213 条 记 录,以下是21-30 订阅
排序:
android malware detection: Investigating the impact of imbalanced data-sets on the performance of machine learning models.  24
Android malware detection: Investigating the impact of imbal...
收藏 引用
24th International Conference on Advanced Communication Technology (ICACT) - Artificial Intelligence Technologies toward Cybersecurity
作者: Sawadogo, Zakaria Mendy, Gervais Dembele, Jean Marie Ouya, Samuel Univ Cheikh Anta Diop Dakar LITA Lab Informat Telecommun & Applicat Dakar Senegal Univ Gaston Berger LANI Lab Anal Numer & Informat Dakar Senegal
Artificial intelligence has revolutionized many areas of research, including research on malicious application detection and classification. Nowadays, there are many approaches that learn from existing data and predic... 详细信息
来源: 评论
android malware detection Using Local Binary Pattern and Principal Component Analysis  3rd
Android Malware Detection Using Local Binary Pattern and Pri...
收藏 引用
3rd International Conference of Pioneering Computer Scientists, Engineers and Educators (ICPCSEE)
作者: Wu, Qixin Qin, Zheng Zhang, Jinxin Yin, Hui Yang, Guangyi Hu, Kuangsheng Hunan Univ Coll Comp Sci & Elect Engn Changsha Hunan Peoples R China Hunan Key Lab Big Data Res & Applicat Changsha Hunan Peoples R China Hunan Inst Metrol & Test Changsha Hunan Peoples R China
Nowadays, analysis methods based on big data have been widely used in malicious software detection. Since android has become the dominator of smartphone operating system market, the number of android malicious applica... 详细信息
来源: 评论
android malware detection: Feature Update Using Incremental Learning Approach: Further Investigation of UFILA  25
Android Malware Detection: Feature Update Using Incremental ...
收藏 引用
25th International Conference on Advanced Communication Technology (ICACT) - New Cyber Security Risks for Enterprise Amidst COVID-19 Pandemic
作者: Degrees, Zakaria Sawadogo Dembele, Jean-Marie Degrees, Gervais Mendy Ouya, Samuel Cheikh Anta Diop Univ LITA Lab Comp Sci Telecommun & Applicat Dakar Senegal Gaston Berger Univ LANI Lab Numer Anal & Comp Sci Dakar Senegal
Several kinds of mobile applications are available on platforms offering various services to users. Both malware and good applications are found in software repositories, which is a major cybersecurity problem. To add... 详细信息
来源: 评论
android malware detection: An in-depth investigation of the impact of the use of imbalance datasets on the efficiency of machine learning models  25
Android malware detection: An in-depth investigation of the ...
收藏 引用
25th International Conference on Advanced Communication Technology (ICACT) - New Cyber Security Risks for Enterprise Amidst COVID-19 Pandemic
作者: Degrees, Zakaria Sawadogo Dembele, Jean-Marie Degrees, Gervais Mendy Ouya, Samuel Cheikh Anta Diop Univ LITA Lab Comp Sci Telecommun & Applicat Dakar Senegal Gaston Berger Univ LANI Lab Numer Anal & Comp Sci Dakar Senegal Gaston Berger Univ Dakar Senegal Univ Cheikh Anta Diop ESP Polytechn Sch Dakar Senegal Gaston Berger Univ Comp Sci Dakar Senegal
Machine learning techniques have become an essential part of research into the detection and classification of malicious applications. There are several approaches or algorithms that learn from existing data and predi... 详细信息
来源: 评论
android malware detection and identification frameworks by leveraging the machine and deep learning techniques: A comprehensive review
收藏 引用
TELEMATICS AND INFORMATICS REPORTS 2024年 14卷
作者: Smmarwar, Santosh K. Gupta, Govind P. Kumar, Sanjay Natl Inst Technol Dept Informat Technol Raipur 492010 India
The ever-increasing growth of online services and smart connectivity of devices have posed the threat of malware to computer system, android-based smart phones, Internet of Things (IoT)-based systems. The anti-malware... 详细信息
来源: 评论
android malware detection using Convolutional Deep Neural Networks  4
Android Malware Detection using Convolutional Deep Neural Ne...
收藏 引用
4th International Conference on Advanced Aspects of Software Engineering (ICAASE)
作者: Bourebaa, Fatima Benmohammed, Mohamed Univ Constantine 2 Abdelhamid Mehri Lire Lab Constantine Algeria
Deep learning in general and convolutional architectures, in particular, have pushed the limits of the current state of the art in the field of computer vision and the processing of natural languages and speech. Recen... 详细信息
来源: 评论
android malware detection BASED ON HETEROGENEOUS INFORMATION NETWORK WITH CROSS-LAYER FEATURES  19
ANDROID MALWARE DETECTION BASED ON HETEROGENEOUS INFORMATION...
收藏 引用
19th IEEE International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)
作者: Ren Xixuan Zhao Lirui Wang Kai Xue Zhixing Hou Anran Shao Qiao Univ Elect Sci & Technol China Sch Comp Sci & Engn Chengdu 611731 Peoples R China
As a mature and open mobile operating system, android runs on many IoT devices, which has led to android-based IoT devices have become a hotbed of malware. Existing static detection methods for malware using artificia... 详细信息
来源: 评论
android malware detection based on multi-category and tag level ratio  5
Android malware detection based on multi-category and tag le...
收藏 引用
IEEE 5th Information Technology and Mechatronics Engineering Conference (ITOEC)
作者: Yang, Zongjing Long, Zhaohua Chongqing Univ Posts & Telecommun Sch Comp Sci & Technol Chongqing 400000 Peoples R China
The arrival of the mobile platforms has brought much convenience to our life, people start to get used to social events, online shopping, and business activities with mobile phones, especially those with the android s... 详细信息
来源: 评论
DCEL:classifier fusion model for android malware detection
收藏 引用
Journal of Systems Engineering and Electronics 2024年 第1期35卷 163-177页
作者: XU Xiaolong JIANG Shuai ZHAO Jinbo WANG Xinheng Jiangsu Key Laboratory of Big Data Security&Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing 210023China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China School of Computing and Engineering University of West LondonLondon W55RFUK
The rapid growth of mobile applications,the popularity of the android system and its openness have attracted many hackers and even criminals,who are creating lots of android ***,the current methods of android malware ... 详细信息
来源: 评论
Comprehensive benchmarking of knowledge graph embeddings methods for android malware detection
收藏 引用
Expert Systems with Applications 2025年 288卷
作者: Jan Kincl Tome Eftimov Adam Viktorin Roman Šenkeřík Tanja Pavleska Laboratory for Open Systems and Networks Jozef Stefan Institute Jamova Cesta 39 Ljubljana 1000 Slovenia Jožef Stefan International Postgraduate School Jamova Cesta 39 Ljubljana 1000 Slovenia School of Information and Physical Sciences University of Newcastle University Dr. Callaghan Newcastle 2308 NSW Australia The Computer Systems Department Jozef Stefan Institute Jamova Cesta 39 Ljubljana 1000 Slovenia Faculty of Applied Informatics Tomas Bata University in Zlin nam. T. G. Masaryka 5555 Zlin 76001 Czech Republic
The rising popularity and open-source model of the android operating system has made it a main target for attackers creating malware applications. With the mobile industry being an expanding device ecosystem, there is... 详细信息
来源: 评论