Contrasting Permission Patterns between Clean and Malicious Android Applications

Full text for this resource is not available from the Research Repository.

Moonsamy, V, Rong, Jia ORCID: 0000-0002-9462-3924, Liu, S, Li, G and Batten, L (2013) Contrasting Permission Patterns between Clean and Malicious Android Applications. In: Security and Privacy in Communication Networks - 9th International ICST (Institute for Computer Sciences, Social Informatics and Telecommunications Engineering) Conference, SecureComm 2013, 25 September 2013-27 September 2013, Sydney.

Abstract

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 127)

Item type Conference or Workshop Item (Paper)
URI http://vuir.vu.edu.au/id/eprint/33791
Identification Number https://doi.org/10.1007/978-3-319-04283-1_5
Official URL https://link.springer.com/chapter/10.1007/978-3-31...
ISBN 9783319042824
Subjects Current > FOR Classification > 0801 Artificial Intelligence and Image Processing
Current > Division/Research > College of Science and Engineering
Keywords android permissions; unique used permission patterns; contrast permission patterns; pattern mining; data mining; malware
Citations in Scopus 7 - View on Scopus
Download/View statistics View download statistics for this item

Search Google Scholar

Repository staff login