Contrasting Permission Patterns between Clean and Malicious Android Applications
Download
Full text for this resource is not available from the Research Repository.
Export
Moonsamy, V, Rong, Jia ORCID: 0000-0002-9462-3924, Liu, S, Li, G and Batten, Lynn (2013) Contrasting Permission Patterns between Clean and Malicious Android Applications. In: Security and Privacy in Communication Networks - 9th International ICST (Institute for Computer Sciences, Social Informatics and Telecommunications Engineering) Conference, SecureComm 2013, 25 September 2013-27 September 2013, Sydney.
Abstract
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 127)
Dimensions Badge
Altmetric Badge
Item type | Conference or Workshop Item (Paper) |
URI | https://vuir.vu.edu.au/id/eprint/33791 |
DOI | 10.1007/978-3-319-04283-1_5 |
Official URL | https://link.springer.com/chapter/10.1007/978-3-31... |
ISBN | 9783319042824 |
Subjects | Historical > FOR Classification > 0801 Artificial Intelligence and Image Processing Current > Division/Research > College of Science and Engineering |
Keywords | android permissions; unique used permission patterns; contrast permission patterns; pattern mining; data mining; malware |
Citations in Scopus | 8 - View on Scopus |
Download/View statistics | View download statistics for this item |
CORE (COnnecting REpositories)