Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

state-of-the-art graph similarity algorithm

biblio

Visible to the public Detection of transformed malwares using permission flow graphs

Submitted by grigby1 on Wed, 06/20/2018 - 12:49pm
  • privacy
  • malware variants
  • Measurement
  • Metrics
  • mobile computing
  • nontransformed malware
  • permission flow graph
  • permission flow graphs
  • permission framework
  • Malware Analysis
  • pubcrawl
  • resilience
  • Resiliency
  • signature based detection
  • smart phones
  • state-of-the-art graph similarity algorithm
  • transformed malware
  • vertex level
  • graph based similarity metrics
  • Android malware
  • Androids
  • attack surface
  • code level changes
  • control flow
  • detection accuracy
  • feature extraction
  • flow graphs
  • Android app
  • graph theory
  • Human behavior
  • Humanoid robots
  • invasive software
  • learning (artificial intelligence)
  • lightweight static Permission Flow Graph based approach
  • malicious apps
  • malware

Terms of Use  |  ©2023. CPS-VO