怎样才咆哮 发表于 2025-3-25 04:08:51

GranDroid: Graph-Based Detection of Malicious Network Behaviors in Android Applicationsical challenge. Traditionally, static analysis provides soundness for Android malware detection, but it also leads to high false positives. It is also challenging to guarantee the completion of static analysis within a given time constraint, which is an important requirement for real-world security

muscle-fibers 发表于 2025-3-25 11:14:17

FGFDect: A Fine-Grained Features Classification Model for Android Malware Detectionature extraction has not been done perfectly, hence, invalid features will not only bring additional overhead but also reduce the detection accuracy. In this paper, we propose FGFDect, a malware classification model by mining Android applications for fine-grained features. Our work aims to handle tw

aerobic 发表于 2025-3-25 14:49:09

Conference proceedings 2018ubmissions. The papers are organized in topical sections on IoT security, user and data privacy, mobile security, wireless security, software security, cloud security, social network and enterprise security, network security, applied cryptography, and web security..

强行引入 发表于 2025-3-25 17:17:34

http://reply.papertrans.cn/87/8635/863500/863500_24.png

人充满活力 发表于 2025-3-25 22:06:16

http://reply.papertrans.cn/87/8635/863500/863500_25.png

打包 发表于 2025-3-26 00:46:22

Yaxing Chen,Wenhai Sun,Ning Zhang,Qinghua Zheng,Wenjing Lou,Y. Thomas Hou

BAN 发表于 2025-3-26 04:31:54

Devkishen Sisodia,Samuel Mergendahl,Jun Li,Hasan Cam

anatomical 发表于 2025-3-26 12:22:03

Sophie Dramé-Maigné,Maryline Laurent,Laurent Castillo,Hervé Ganem

解脱 发表于 2025-3-26 15:18:34

http://reply.papertrans.cn/87/8635/863500/863500_29.png

真实的你 发表于 2025-3-26 17:18:10

Yangguang Tian,Yingjiu Li,Rongmao Chen,Nan Li,Ximeng Liu,Bing Chang,Xingjie Yu
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Security and Privacy in Communication Networks; 14th International C Raheem Beyah,Bing Chang,Sencun Zhu Conference proceedings 2018 ICST In