咨询与建议

限定检索结果

文献类型

  • 129 篇 期刊文献
  • 86 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 217 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 206 篇 工学
    • 186 篇 计算机科学与技术...
    • 70 篇 电气工程
    • 55 篇 信息与通信工程
    • 38 篇 软件工程
    • 13 篇 控制科学与工程
    • 5 篇 网络空间安全
    • 3 篇 仪器科学与技术
    • 2 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 石油与天然气工程
  • 19 篇 管理学
    • 16 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 理学
    • 10 篇 化学
    • 3 篇 生物学
    • 2 篇 数学
  • 3 篇 农学
    • 3 篇 水产
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学

主题

  • 217 篇 android malware ...
  • 63 篇 machine learning
  • 30 篇 deep learning
  • 29 篇 static analysis
  • 19 篇 feature extracti...
  • 17 篇 mobile security
  • 15 篇 malware
  • 11 篇 feature selectio...
  • 9 篇 graph neural net...
  • 9 篇 function call gr...
  • 7 篇 classification
  • 6 篇 ensemble learnin...
  • 5 篇 malware classifi...
  • 5 篇 adversarial mach...
  • 5 篇 semantics
  • 5 篇 smart phones
  • 5 篇 codes
  • 5 篇 security
  • 5 篇 artificial intel...
  • 5 篇 training

机构

  • 5 篇 chinese acad sci...
  • 5 篇 univ chinese aca...
  • 4 篇 univ elect sci &...
  • 3 篇 univ sci & techn...
  • 3 篇 beijing univ tec...
  • 3 篇 harbin inst tech...
  • 3 篇 sichuan univ sch...
  • 3 篇 southwest univ s...
  • 3 篇 beijing univ pos...
  • 3 篇 west virginia un...
  • 2 篇 shandong prov ke...
  • 2 篇 hong kong polyte...
  • 2 篇 cheikh anta diop...
  • 2 篇 natl taiwan univ...
  • 2 篇 tsinghua univ de...
  • 2 篇 shandong univ pe...
  • 2 篇 fujian normal un...
  • 2 篇 univ basque coun...
  • 2 篇 univ basque coun...
  • 2 篇 xinjiang univ sc...

作者

  • 5 篇 ye yanfang
  • 5 篇 hou shifu
  • 4 篇 yuan wei
  • 4 篇 ouya samuel
  • 4 篇 zhu dali
  • 4 篇 vinod p.
  • 4 篇 zhang yiming
  • 3 篇 xue jingfeng
  • 3 篇 nazir ahsan
  • 3 篇 wajahat ahsan
  • 3 篇 wang ruoyu
  • 3 篇 chen zhenxiang
  • 3 篇 moonsamy veelash...
  • 3 篇 ge xiuting
  • 3 篇 mahmood tariq
  • 3 篇 li heng
  • 3 篇 conti mauro
  • 3 篇 luo xiapu
  • 3 篇 sezer sakir
  • 3 篇 bostani hamid

语言

  • 216 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=Android malware detection"
217 条 记 录,以下是111-120 订阅
排序:
HinDroid: An Intelligent android malware detection System Based on Structured Heterogeneous Information Network  17
HinDroid: An Intelligent Android Malware Detection System Ba...
收藏 引用
23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)
作者: Hou, Shifu Ye, Yanfang Song, Yangqiu Abdulhayoglu, Melih West Virginia Univ Dept CSEE Morgantown WV 26506 USA HKUST Dept CSE Hong Kong Peoples R China Comodo Secur Solut Inc Clinton NY USA
With explosive growth of android malware and due to the severity of its damages to smart phone users, the detection of android malware has become increasingly important in cybersecurity. The increasing sophistication ... 详细信息
来源: 评论
An android malware detection System Based on Behavior Comparison Analysis  17th
An Android Malware Detection System Based on Behavior Compar...
收藏 引用
17th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP)
作者: Tao, Jing Zhang, Yan Cao, Pengfei Wang, Zheng Zhao, Qiqi Xi An Jiao Tong Univ Minist Educ Key Lab Intelligent Networks & Network Secur Xian 710049 Peoples R China
At present, android malwares become more and more subtle and intelligent, after their invasion, they often detect whether the running environment is a real environment, to decide whether to perform their malicious beh... 详细信息
来源: 评论
XGBoost-Based android malware detection  13
XGBoost-Based Android Malware Detection
收藏 引用
13th International Conference on Computational Intelligence and Security (CIS)
作者: Wang, Jiong Li, Boquan Zeng, Yuwei Chinese Acad Sci Inst Informat Engn Beijing 100093 Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing 100049 Peoples R China
malware remains the most significant security threat to smartphones in spite of the constantly upgrading of the system. In this paper, we introduce an android malware detection method based on XGBoost model. We subseq... 详细信息
来源: 评论
android malware detection Using Local Binary Pattern and Principal Component Analysis
Android Malware Detection Using Local Binary Pattern and Pri...
收藏 引用
The Third International Conference of Pioneering Computer Scientists, Engineers and Educators,ICPCSEE 2017(originally ICYCSEE)
作者: Qixin Wu Zheng Qin Jinxin Zhang Hui Yin Guangyi Yang Kuangsheng Hu College of Computer Science and Electronic Engineering Hunan University Hunan Key Laboratory of Big Data Research and Application Hunan Institute of Metrology and Test
Nowadays, analysis methods based on big data have been widely used in malicious software detection. Since android has become the dominator of smartphone operating system market, the number of android malicious applica... 详细信息
来源: 评论
Fuzzy-synthetic minority oversampling technique: Oversampling based on fuzzy set theory for android malware detection in imbalanced datasets
收藏 引用
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS 2017年 第4期13卷 1-15页
作者: Xu, Yanping Wu, Chunhua Zheng, Kangfeng Niu, Xinxin Yang, Yixian Beijing Univ Posts & Telecommun Sch Comp Sci Beijing Peoples R China
In previous work, imbalanced datasets composed of more benign samples (the majority class) than the malicious one (the minority class) have been widely adopted in android malware detection. These imbalanced datasets b... 详细信息
来源: 评论
Feature Selection to Mine Joint Features from High-dimension Space for android malware detection
收藏 引用
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 2017年 第9期11卷 4658-4679页
作者: Xu, Yanping Wu, Chunhua Zheng, Kangfeng Niu, Xinxin Lu, Tianling Beijing Univ Posts & Telecommun Sch Cyberspace Secur Beijing 100876 Peoples R China Peoples Publ Secur Univ China Sch Informat Technol & Network Secur Beijing 100038 Peoples R China
android is now the most popular smartphone platform and remains rapid growth. There are huge number of sensitive privacy information stored in android devices. Kinds of methods have been proposed to detect android mal... 详细信息
来源: 评论
A study of android malware detection techniques in virtual environment
收藏 引用
Cluster Computing-The Journal of Networks Software Tools and Applications 2016年 第4期19卷 2295-2304页
作者: Jung, Hyun Mi Kim, Ki-Bong Cho, Han-Jin KISTI Dept Supercomp Syst Dev 245 Daehangno Yuseong Daejeon South Korea Daejeon Hlth Inst Technol Dept Comp & Informat 21 Chungjeong Ro Daejeon South Korea Far E Univ Dept Smart Mobile 76-32 Daehak Gil Gamgok Myeon Eumseong Gun Chungcheongbuk South Korea
With the rapid development of mobile environment, cyber-attacks have become more commonplace and more sophisticated. In smartphone operating system market, in particular, android platform accounts for a large portion ... 详细信息
来源: 评论
An android malware detection Approach Using Bayesian Inference  16
An Android Malware Detection Approach Using Bayesian Inferen...
收藏 引用
IEEE International Conference on Computer and Information Technology (CIT)
作者: Liu, Che-Hsun Zhang, Zhi-Jie Wang, Sheng-De Natl Taiwan Univ Grad Inst Elect Engn Taipei 10617 Taiwan
android malware detection has been a popular research topic due to non-negligible amount of malware targeting the android operating system. In particular, the naive Bayes generative classifier is a common technique wi... 详细信息
来源: 评论
DroidDelver: An android malware detection System Using Deep Belief Network Based on API Call Blocks  17th
DroidDelver: An Android Malware Detection System Using Deep ...
收藏 引用
17th International Conference on Web-Age Information Management (WAIM)
作者: Hou, Shifu Saas, Aaron Ye, Yanfang Chen, Lifei West Virginia Univ Dept Comp Sci & Elect Engn Morgantown WV 26506 USA Fujian Normal Univ Sch Math & Comp Sci Fuzhou 350117 Peoples R China
Because of the explosive growth of android malware and due to the severity of its damages, the detection of android malware has become an increasing important topic in cyber security. Currently, the major defense agai... 详细信息
来源: 评论
Proposed New Features to Improve android malware detection  8
Proposed New Features to Improve Android Malware Detection
收藏 引用
8th International Symposium on Telecommunications (IST)
作者: Vajdi, Mahdi Torkaman, Atefeh Bahrololum, Marjan Tadayon, M. H. Salajegheh, Afshin ITRC Tehran Iran Islamic Azad Univ ITRC South Tehran Branch Tehran Iran Islamic Azad Univ South Tehran Branch Tehran Iran
In recent years, android has become most popular and largest installed operating systems in smartphones. The openness capability of android applications let the users to easily download many applications from markets.... 详细信息
来源: 评论