Open Access
Issue |
MATEC Web Conf.
Volume 309, 2020
2019 International Conference on Computer Science Communication and Network Security (CSCNS2019)
|
|
---|---|---|
Article Number | 02002 | |
Number of page(s) | 8 | |
Section | Network Security and Software Design | |
DOI | https://doi.org/10.1051/matecconf/202030902002 | |
Published online | 04 March 2020 |
- N. McLaughlin, J. M. del Rincon, B. Kang, S. Yerima, Deep Android Malware Detection. ACM Conference on Data and Application Security and Privacy, 2017. [Google Scholar]
- Ming Fan, Jun Liu, Xiapu Luo, Kai Chen, Zhenzhou Tian, Qinghua Zheng, Ting Liu. Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis. IEEE Transaction on Information Forensics and Security, 2018, 13(8): 1890–1905. [CrossRef] [Google Scholar]
- Jixin Zhang, Zheng Qin, Hui Yin, Lu Ou, Kehuan Zhang, A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding, Computers & Security, 2019, 84: 376–392. [CrossRef] [Google Scholar]
- Silvio Cesare, Yang Xiang, Wanlei Zhou. Control Flow-Based Malware Variant Detection. IEEE Transactions on Dependable and Secure Computing, 2014, 11(4): 307–317. [CrossRef] [Google Scholar]
- Jixin Zhang, Zheng Qin, Kehuan Zhang, Hui Yin, Jingfu Zou, Dalvik Opcode Graph based Android Malware Variants Detection, IEEE Access, 2018, 2018, 6: 51964–51974. [CrossRef] [Google Scholar]
- Jianjun Huang, Xiangyu Zhang, Lin Tan. AsDroid detecting stealthy behaviors in Android applications by user interface and program behavior contradiction. ACM/IEEE International Conference on Software Engineering, 2014: 1036–1046. [Google Scholar]
- Canzanese R. et al. System call-based detection of malicious processes. In proc. of IEEE international conference on software quality, Reliability and Security, 2015: 119–24. [Google Scholar]
- Wei Yang, Xusheng Xiao, Benjamin Andow. AppContext difffferentiating malicious and benign mobile app behaviors using context. ACM/IEEE International Conference on Software Engineering, 2015: 303–313. [Google Scholar]
- Asaf Shabtai, Yuval Elovici, Uri Kanonov, Yael Weiss, Chanan Glezer. Andromaly: a behavioral malware detection framework for android devices. Journal of Intelligent Information Systems, 2012, 38(1): 161–190. [CrossRef] [Google Scholar]
- Konrad R et al Automatic analysis of malware behavior using machine learning. J Comput Secur 2013, 19:639–668. [Google Scholar]
- ASPack, http://www.aspack.com", 2019. [Google Scholar]
- UPX, https://upx.github.io, 2019. [Google Scholar]
- VMProtect, https://vmpsoft.com/products/vmprotect/, 2019. [Google Scholar]
- ZProtect, https://tuts4you.com/download.php7view.3017, 2019. [Google Scholar]
- VXHeaven,https://hypestat.com/info/vxheaven.org, 2019. [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.