[1] |
张怡婷, 张扬, 张涛 ,等. 基于朴素贝叶斯的 Android 软件恶意行为智能识别[J]. 东南大学学报:自然科学版, 2015,45(2): 224-230.
|
|
ZHANG Y T , ZHANG Y , ZHANG T ,et al. Intelligent identification of malicious behavior in Android applications based on naive Bayes[J]. Journal of Southeast University:Natural Science Edition, 2015,45(2): 224-230.
|
[2] |
张锐, 杨吉云 . 基于权限相关性的 Android 恶意软件检测[J]. 计算机应用, 2014,34(5): 1322-1325.
|
|
ZHANG R , YANG J Y . Android malware detection based on permission correlation[J]. Journal of Computer Applications, 2014,34(5): 1322-1325.
|
[3] |
许艳萍, 伍淳华, 侯美佳 ,等. 基于改进朴素贝叶斯的 Android 恶意应用检测技术[J]. 北京邮电大学学报, 2016,39(2): 43-47.
|
|
XU Y P , WU C H , HOU M J ,et al. Android malware detection technology based on improved naive Bayesian[J]. Journal of Beijing University of Posts and Telecommunications, 2016,39(2): 43-47.
|
[4] |
LI W , GE J , DAI G . Detecting malware for Android platform:an svm-based approach[C]// IEEE,International Conference on Cyber Security and Cloud Computing. New Jersey,USA:IEEE, 2015: 464-469.
|
[5] |
FEIZOLLAH A , ANUAR N B , SALLEH R ,et al. Comparative study of k-means and mini batch k-means clustering algorithms in Android malware detection using network traffic analysis[C]// International Symposium on Biometrics and Security Technologies. New Jersey,USA:IEEE, 2014: 193-197.
|
[6] |
YUAN Z , LU Y , XUE Y . Droid detector:Android malware characterization and detection using deep learning[J]. Tsinghua Science &Technology, 2016,21(1): 114-123.
|
[7] |
文伟平, 梅瑞, 宁戈 ,等. Android恶意软件检测技术分析和应用研究[J]. 通信学报, 2014,35(8): 78-85.
|
|
WEN W P , MEI R , NING G ,et al. Malware detection technology analysis and applied research of Android platform[J]. Journal on Communications, 2014,35(8): 78-85.
|
[8] |
杨欢, 张玉清, 胡予濮 ,等. 基于多类特征的 Android 应用恶意行为检测系统[J]. 计算机学报, 2014,37(1): 15-27.
|
|
YANG H , ZHANG Y Q , HU Y P ,et al. A malware behavior detection system of Android applications based on multi-class features[J]. Chinese Journal of Computers, 2014,37(1): 15-27.
|
[9] |
FEIZOLLAH A , ANUAR N B , SALLEH R ,et al. A review on feature selection in mobile malware detection[J]. Digital Investigation, 2015,6(13): 22-37.
|
[10] |
SHARMA A , DASH S K . Mining API calls and permissions for android malware detection[M]. Cryptology and Network Security. Berlin,Germany: Springer International PublishingPress, 2014: 191-205.
|
[11] |
YANG X L . Malicious detection based on ReliefF and boosting multidimensional features[J]. Journal of Communications, 2015,10(11): 910-917.
|
[12] |
ROBNIK?IKONJA M , KONONENKO I . Theoretical and empirical analysis of ReliefF and RReliefF[J]. Machine Learning, 2003,53(1): 23-69.
|
[13] |
BREIMAN L . Random forest[J]. Machine Learning, 2001,5(1): 5-32.
|
[14] |
ALAM M S , VUONG S T . Random forest classification for detecting android malware[C]// Green Computing and Communications. 2013: 663-669.
|
[15] |
丰生强 . Android软件安全与逆向分析[M]. 北京: 人民邮电出版社, 2013.
|
|
FENG S Q . Android software security and reverse analysis[M]. Beijing: PTPRESSPress, 2013.
|
[16] |
JIANG X , ZHOU Y . Dissecting Android malware:characterization and evolution[C]// IEEE Symposium on Security & Privacy. New Jersey,USA:IEEE, 2012: 95-109.
|