Related references
Note: Only part of the references are listed.Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware
Sanjeev Das et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
Profiling user-trigger dependence for Android malware detection
Karim O. Elish et al.
COMPUTERS & SECURITY (2015)
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context
Wei Yang et al.
2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1 (2015)
Supervised Machine Learning Model for High Dimensional Gene Data in Colon Cancer Detection
Huaming Chen et al.
2015 IEEE INTERNATIONAL CONGRESS ON BIG DATA - BIGDATA CONGRESS 2015 (2015)
Evolution, Detection and Analysis of Malware for Smart Devices
Guillermo Suarez-Tangil et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)
Identifying android malicious repackaged applications by thread-grained system call sequences
Ying-Dar Lin et al.
COMPUTERS & SECURITY (2013)
Andromaly: a behavioral malware detection framework for android devices
Asaf Shabtai et al.
JOURNAL OF INTELLIGENT INFORMATION SYSTEMS (2012)
A graph mining approach for detecting unknown malwares
Mojtaba Eskandari et al.
JOURNAL OF VISUAL LANGUAGES AND COMPUTING (2012)
Smartphone Dual Defense Protection Framework: Detecting malicious applications in Android Markets
X. Su et al.
2012 EIGHTH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR NETWORKS (MSN 2012) (2012)