找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Android Malware Detection using Machine Learning; Data-Driven Fingerpr ElMouatez Billah Karbab,Mourad Debbabi,Djedjiga Mo Book 2021 The Edi

[复制链接]
查看: 29257|回复: 45
发表于 2025-3-21 18:11:55 | 显示全部楼层 |阅读模式
期刊全称Android Malware Detection using Machine Learning
期刊简称Data-Driven Fingerpr
影响因子2023ElMouatez Billah Karbab,Mourad Debbabi,Djedjiga Mo
视频video
发行地址Presents android malware detection framework using machine learning techniques, as well as static and dynamic analysis features.Introduces fingerprinting and clustering system of android malware using
学科分类Advances in Information Security
图书封面Titlebook: Android Malware Detection using Machine Learning; Data-Driven Fingerpr ElMouatez Billah Karbab,Mourad Debbabi,Djedjiga Mo Book 2021 The Edi
影响因子The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation techniques; (3) the portability over different platforms and architectures..First, the authors propose an approximate fingerprinting technique for android packaging that captures the underlying static structure of the android applications in the context of bulk and offline detection at the app-market level. This book proposes a malware clustering framework to perform malware clustering by building and partitioning the similarity network of malicious applications on top of this fingerprinting technique. Second, the authors propose an approximate fingerprinting technique that leverages dynamic analysis and natural language processing techniques to generate Android malware behavior reports. Basedon this fingerprinting technique, the authors propose a portable malware detection framework employing machine learning classification. Third, the authors design an automatic framework to produce intelligence about the underlying malic
Pindex Book 2021
The information of publication is updating

书目名称Android Malware Detection using Machine Learning影响因子(影响力)




书目名称Android Malware Detection using Machine Learning影响因子(影响力)学科排名




书目名称Android Malware Detection using Machine Learning网络公开度




书目名称Android Malware Detection using Machine Learning网络公开度学科排名




书目名称Android Malware Detection using Machine Learning被引频次




书目名称Android Malware Detection using Machine Learning被引频次学科排名




书目名称Android Malware Detection using Machine Learning年度引用




书目名称Android Malware Detection using Machine Learning年度引用学科排名




书目名称Android Malware Detection using Machine Learning读者反馈




书目名称Android Malware Detection using Machine Learning读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 23:31:25 | 显示全部楼层
1568-2633 chnique, the authors propose a portable malware detection framework employing machine learning classification. Third, the authors design an automatic framework to produce intelligence about the underlying malic978-3-030-74666-7978-3-030-74664-3Series ISSN 1568-2633 Series E-ISSN 2512-2193
发表于 2025-3-22 03:36:06 | 显示全部楼层
The Leukocyte Actin Cytoskeletonthreats. Such threats could be committed by adversaries who might gain access to sensitive information and resources through Android malware apps. In this context, protecting Android devices from malicious apps is of paramount importance. This raises the need for security solutions to protect users
发表于 2025-3-22 07:22:01 | 显示全部楼层
发表于 2025-3-22 12:35:59 | 显示全部楼层
https://doi.org/10.1007/978-3-540-76376-5tinct authors and certificates, are most likely to be malicious if they are highly similar. Because the adversary usually repackages multiple app packages with the same malicious payload to hide it from anti-malware and vetting systems. Consequently, it is difficult to detect such malicious payloads
发表于 2025-3-22 13:33:17 | 显示全部楼层
https://doi.org/10.1007/978-3-540-76376-5ion at the end host, in . (2009), pp. 351–366) used specific features to build behavioral graphs for Win32 malware detection. The security features may change based on the execution environment despite the target platform. For instance, the authors in Chen et al. (Stormdroid: A streaminglized machin
发表于 2025-3-22 18:21:51 | 显示全部楼层
https://doi.org/10.1007/978-3-540-76376-5sub-cyber-infrastructures. To this end, . leverages cyber-threat intelligence that is derived from various sources such as spam, Windows malware, darknet, and passive DNS to ascribe cyber-threats to the corresponding cyber-infrastructure. Accordingly, the input of . framework is made of malware samp
发表于 2025-3-22 23:30:18 | 显示全部楼层
https://doi.org/10.1007/978-3-540-76376-5id malware were discovered in 2014 and 2015, respectively. Nowadays, the number of malware samples reaches millions per month and is growing exponentially over time. In this context, it is a desideratum to elaborate scalable, robust, and accurate techniques and frameworks that tackle two specific pr
发表于 2025-3-23 04:35:21 | 显示全部楼层
Introduction,threats. Such threats could be committed by adversaries who might gain access to sensitive information and resources through Android malware apps. In this context, protecting Android devices from malicious apps is of paramount importance. This raises the need for security solutions to protect users
发表于 2025-3-23 06:07:20 | 显示全部楼层
Background and Related Work,der three main deployment architectures: ., ., and . architectures. The proposed two-level taxonomy allows carrying out an objective and appropriate analysis by comparing only systems that are addressing the same threat category, and having the same deployment architecture as they share the same goa
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-19 17:41
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表