[1] |
Alcatel-Lucent Motive security labs malware reports-H1 2015[R/OL]. (2015-0920) [2016-07-30]..
|
[2] |
SHABTAI A . Malware detection on mobile devices[C]// The 11th International Conference on Mobile Data Management, May 23-26,2010, Kansas City, Missouri, USA. New Jersey:IEEE Press, 2010: 289-290.
|
[3] |
王志国, 侯银涛, 石荣刚 . Android 智能手机系统的文件实时监控技术[J]. 计算机安全, 2009,12(12):42-44. WANG Z G , HOU Y T , SHI R G . The file real-time monitoring technology based on the android smart phone system[J]. Computer Security, 2009,12(12):42-44.
|
[4] |
ENCK W , GILBERT P , CHUN B . TaintDroid: an information-flow tracking system for real-time privacy monitoring on smartphones[C]// 9th USENIX Symposium on Operating Systems Design and Implementation, October 4-6,2010, Vancouver, BC, Canada. New Jersey:IEEE Press, 2010.
|
[5] |
冯博, 戴航, 慕德俊 . Android 恶意软件检测方法研究[J]. 计算机技术与发展, 2014,24(2):149-152. FENG B , DAI H , MU D J . A research of malware detection for android[J]. Computer Technology and Development, 2014,24(2):149-152.
|
[6] |
卿斯汉 . Android 安全研究进展[J]. 软件学报, 2016,27(1):45-71. QING S H . Research progress on Android security[J]. Journal of Software, 2016,27(1):45-71.
|
[7] |
DAVIES S , RUSSELL S . Np-completeness of searches for smallest possible feature sets[C]// AAAI Fall 94 Symposium on Relevance, July 31-August 4,1994, Seattle, Washington, USA. New Jersey:IEEE Press, 1994:37-39.
|
[8] |
刘华文 . 基于信息熵的特征选择算法研究[D]. 长春:吉林大学, 2010:21-28. LIU H W . A study on feature selection algorithms using information entropy[J]. Changchun:Jilin University, 2010:21-28.
|
[9] |
SCHMIDT A , BYE R , SCHMIDT H , et al. Static analysis of executables for collaborative malware detection on android[C]// The 9th IEEE International Conference on Communications, June 14-18,2009, Dresden, Germany. New Jersey:IEEE Press, 2009: 1-5.
|
[10] |
童振飞, 杨庚 . Android平台恶意软件的静态行为检测[J]. 江苏通信:技术与实践, 2011:39-47. TONG Z F , YANG G . Static behavior detection of malware on android platform[J]. Jiangsu Communication: Technology Practice, 2011:39-47.
|
[11] |
欧阳博宇, 刘新, 徐婵 , 等. 基于支持向量机的恶意软件行为评估系统[J]. 计算机应用, 2015,35(4):972-976,980 OUYANG B Y , LIU X , XU C , et al. Malware behavior assessment system based on support vector machine[J]. Journal of Computer Applications, 2015,35(4):972-976,980
|
[12] |
计智伟, 胡珉, 尹建新 . 特征选择算法综述[J]. 电子设计工程, 2011,19(9):46-51. JI Z W , HU M , YIN J X . A survey of feature selection algorithm[J]. Electronic Design Engineering, 2011,19(9):46-51.
|
[13] |
HUANG C , YANG D , CHUANG Y . Application of wrapper approach and composite classifier to the stock trend prediction[J]. Expert Systems with Application, 2008,4(34):2870-2878.
|
[14] |
GALAR M , FERNANDEZ A , BARRENECHEA E , et al. A review on ensembles for the class imbalance problem: bagging-, boosting-, and hybrid-based approaches[J]. IEEE Transactions on Systems Man & Cybernetics Part C, 2012,42(4):463-484.
|
[15] |
中国互联网协会. 恶意软件定义细则[EB/OL]. (2007-06-15)[2006-07-01] .InternetSocietyofChina. Thedefinitionofmalicioussoftware[EB/OL]. (2007-06-15)[2006-07-01] .
|
[16] |
CLAUD X . 移动安全这五年[EB/OL]. (2014-10-01) [2016-07-10] . XIAO C . Mobile security in 5 years[EB/OL]. (2014-10-01) [2016-07-10] .
|
[17] |
UNUCHEK R . The most sophisticated android trojan[EB/OL]. (2013-06-06) [2016-07-10] .
|
[18] |
GUYON I , ELISSEEFF A . An introduction to variable and feature selection[J]. Journal of Machine Learning Research, 2003(3): 1157-1182.
|
[19] |
ZHANG R . ROC curve-threshold evaluation criteria[EB/OL]. (2012-03-16) [2016-07-30]. .
|
[20] |
王科欣, 徐辉 . 基于最小错误率与最小风险的贝叶斯分类比较与研究[J]. 科技信息, 2009(23):236-245. WANG K X , XU H . Comparative study on minimum error rate bayes and minimum risk bayes[J]. Science & Technology Information, 2009(23):236-245.
|