Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Android malware
biblio
An Effective Android Ransomware Detection Through Multi-Factor Feature Filtration and Recurrent Neural Network
Submitted by aekwall on Mon, 03/23/2020 - 12:25pm
smart phones
multifactor feature filtration
majority voting process
Long short-term memory
filtration
feature selection algorithms
feature filtration techniques
deep learning-based malware detection model
Android ransomware detection
Android malware dataset
Android malware
Android environment
recurrent neural network
defense mechanisms
recurrent neural nets
forensic analysis
security
Malware Analysis
Digital Forensics
Metrics
deep learning
Ransomware
composability
pubcrawl
Resiliency
learning (artificial intelligence)
Feature Selection
feature extraction
mobile computing
invasive software
smart devices
biblio
Lightweight, Obfuscation-Resilient Detection and Family Identification of Android Malware
Submitted by grigby1 on Wed, 10/02/2019 - 1:56pm
Android malware
Lightweight
machine learning
native code
obfuscation
pubcrawl
reflection
resilience
Resiliency
biblio
Identification of Distributed Malware
Submitted by grigby1 on Mon, 06/10/2019 - 12:59pm
public domain software
malware writers
Metrics
mobile computing
Mobile handsets
multiple anti-virus apps
open source platform
personal data
privacy
pubcrawl
malware prevention
Resiliency
security
Servers
simple worms
smart phones
smartphone revolution
sophisticated DDOS
static analysis
technological complexities increase
generic viruses
Android malware
Android system
attackers
botnets
computer malware
computer viruses
distributed direction
distributed malware
fully functional portable computers
android
Google
graph matching algorithm
graph theory
Human behavior
inholding multiple applications
Labeling
malware
Malware Analysis
malware detection
biblio
Android Malware Detection Using Convolutional Neural Networks and Data Section Images
Submitted by grigby1 on Fri, 02/22/2019 - 3:04pm
security
pubcrawl
Resiliency
Scalability
Android malware
CNN
data section
grayscale image
Stochastic computing
biblio
Effective and Explainable Detection of Android Malware Based on Machine Learning Algorithms
Submitted by Katie Dey on Mon, 08/06/2018 - 12:24pm
Android malware
dimensional
feature extraction
probability statistics
SVM
Extraction
biblio
Detection of transformed malwares using permission flow graphs
Submitted by grigby1 on Wed, 06/20/2018 - 11:49am
privacy
malware variants
Measurement
Metrics
mobile computing
nontransformed malware
permission flow graph
permission flow graphs
permission framework
Malware Analysis
pubcrawl
resilience
Resiliency
signature based detection
smart phones
state-of-the-art graph similarity algorithm
transformed malware
vertex level
graph based similarity metrics
Android malware
Androids
attack surface
code level changes
control flow
detection accuracy
feature extraction
flow graphs
Android app
graph theory
Human behavior
Humanoid robots
invasive software
learning (artificial intelligence)
lightweight static Permission Flow Graph based approach
malicious apps
malware
biblio
Droidrevealer: Automatically detecting Mysterious Codes in Android applications
Submitted by grigby1 on Wed, 02/21/2018 - 12:47pm
Libraries
undetectable codes
smart phones
Sensitive Behavior
Scalability
Resiliency
resilience
pubcrawl
Mysterious Codes
Metrics
malware detection
malware
malicious code snippets
android
invasive software
Humanoid robots
Human Factors
Human behavior
encryption
Droidrevealer
Decrypt
Decode
Androids
Android malware
android encryption
Android (operating system)
biblio
FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature
Submitted by grigby1 on Tue, 09/19/2017 - 11:14am
Android malware
automatic feature engineering
Human behavior
Metrics
natural language processing
pubcrawl
Resiliency
semantic network
Text Mining
biblio
Dissecting Android Malware: Characterization and Evolution
Submitted by rvmeush on Fri, 09/26/2014 - 12:03pm
malware
smartphone security
smart phones
representative mobile security software
representative family
Payloads
operating systems (computers)
next-generation antimobile-malware solutions
mobile malware
mobile computing
Mobile communication
mobile antivirus software
activation mechanisms
installation methods
Humanoid robots
evolution-based study
defense capability
computer viruses
carried malicious payloads
Androids
Android platform
Android malware family
Android malware
« first
‹ previous
1
2