1 |
"Mobile threat report q4 2012," F-Secure, 2012
|
2 |
"NQ mobile 2012 security report," NQ mobile, 2012
|
3 |
S. Y. Yerima, S. Sezer, G. McWilliams and I. Muttik, "A new android malware detection approach using bayesian classification," Advanced Information Networking and Applications (AINA), 2013 IEEE 27th International Conference on. IEEE, pp.121-128, 2013.
|
4 |
C. Kolbitsch, Anubis: Analyzing unknown binaries. URL {http://anubis. iseclab.org}
|
5 |
A. Reina, A. Fattori and L. Cavallaro, "A system call-centric analysis and stimulation technique to automatically reconstruct android malware behaviors," EuroSec, April. 2013.
|
6 |
Android, Android developers. URL {http://developer.android.com}
|
7 |
A. P. Felt, E. Chin, S. Hanna, D. song and D. Wagner. "Android permissions demystified," Proceedings of the 18th ACM conference on Computer and communications security, ACM, pp. 627-638, Oct, 2011.
|
8 |
D. Barber, "Machine learning a probabilistic approach," 2006.
|
9 |
Mila, Contagio mobile. URL {http://contagiominidump.blogspot.kr}
|
10 |
K. Forter, S. Monteleone, A. Calatroni, D. Roggen and G. Troster, "Incremental kNN classifier exploiting correct-error teacher for activity recognition," Machine Learning and Applications (ICMLA), 2010 Ninth International Conference on. IEEE, pp. 445-450, Dec. 2010.
|
11 |
"Gartner Says Smartphone Sales Grew 46.5 Percent in Second Quarter of 2013 and Exceeded Feature Phone Sales for First Time," Gartner, August, 2014
|