Research Repository

Contrasting Permission Patterns between Clean and Malicious Android Applications

Moonsamy, V, Rong, Jia ORCID: 0000-0002-9462-3924, Liu, S, Li, G and Batten, L (2013) Contrasting Permission Patterns between Clean and Malicious Android Applications. In: Security and Privacy in Communication Networks - 9th International ICST (Institute for Computer Sciences, Social Informatics and Telecommunications Engineering) Conference, SecureComm 2013, 25 September 2013-27 September 2013, Sydney.

Full text for this resource is not available from the Research Repository.

Abstract

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 127)

Item Type: Conference or Workshop Item (Paper)
ISBN: 9783319042824
Uncontrolled Keywords: android permissions; unique used permission patterns; contrast permission patterns; pattern mining; data mining; malware
Subjects: FOR Classification > 0801 Artificial Intelligence and Image Processing
Faculty/School/Research Centre/Department > College of Science and Engineering
Depositing User: Symplectic Elements
Date Deposited: 08 Jun 2017 23:27
Last Modified: 21 Jun 2018 04:46
URI: http://vuir.vu.edu.au/id/eprint/33791
DOI: https://doi.org/10.1007/978-3-319-04283-1_5
ePrint Statistics: View download statistics for this item
Citations in Scopus: 7 - View on Scopus

Repository staff only

View Item View Item

Search Google Scholar