1 |
J. Kim and E. Im, "Android malware detection using dynamic analysis in virtual system," in Proc. KICS Conf., pp. 816-817, 2012.
|
2 |
AhnLab, Security Center, "ASEC Report 2013," vol. 48, 2013.
|
3 |
F-Secure, "Mobile Threat Report Q1 2014," 4, 2014.
|
4 |
B. Amos, H. Turner, and J. White, "Applying machine learning classifiers to dynamic android malware detection at scale," IEEE Int. Wirel. Commun. Mobile Computing Conf. (IWCMC), pp. 1666-1671, Sardinia, Jul. 2013.
|
5 |
A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss, "Andromaly: A behavioral malware detection framework for android devices," J. Intell. Inf. Syst., vol. 38, no. 1, pp. 161-190, 2012.
DOI
|
6 |
J. Park, and M. Kim, "Usage patterns and market development of smartphone," in Proc. IEIE Conf., pp. 572-575, 2013.
|
7 |
M. Choi, C. Jin, and M. Kim, "Classification of client-side application-level HTTP traffic," J. KICS, vol. 36, no. 11, pp. 1277-1284, 2011.
과학기술학회마을
DOI
ScienceOn
|
8 |
J. Park, S. Yoon, J. Park, H. Lee, S. Lee, and M. Kim, "Performance improvement of the payload signature based traffic classification system," J. KICS, vol. 35, no. 9, pp. 1287-1294, 2010.
과학기술학회마을
|
9 |
H. S. Ham, and M. J. Choi, "Analysis of android malware detection performance using machine learning classifiers," Int. Conf. ICT Convergence, pp. 490-495, Jeju Island, Korea, Oct. 2013.
|
10 |
R. M. Elbasiony, E. A. Sallam, T. E. Eltobely, and M. M. Fahmy, "A hybrid network intrusion detection framework based on random forests and weighted k-means," J. Ain Shams Eng., vol. 4, no. 4, pp. 753-762, 2013.
DOI
ScienceOn
|
11 |
Y. Fledel, A. Shabtai, D. Potashnik, and Y. Elovici, "Google android: an updated security review," Mobile Comput., Appl. Serv., Springer Berlin Heidelberg, vol. 76, pp. 401-414, 2012.
DOI
|