[1] |
Statcount globalstats[EB/OL].[2019-08-01].https:∥gs.statcounter.com/ os-market-share/mobile/worldwide/# monthly-201808-201908.
|
[2] |
Data of appbrain[EB/OL].[2019-02-20].https://www.appbrain.com/ stats/number-of-android-apps.
|
[3] |
360 Internet Security Center[EB/OL].[2019-02-18].https://zt.360.cn /1101061855.php?dtid=1101061451&did =610100815.
|
[4] |
Wang W,Zhao M,Gao Z,et al.Constructing features for detecting Android malicious applications:Issues,taxonomy and directions[J].IEEE Access,2019,7:67602-67631.
|
[5] |
Felt A,Greenwood K,Wagner D.The effectiveness of application permissions[C]∥Proc of the 2nd USENIX Conference on Web Application Development,2011:1-7.
|
[6] |
Nix R,Zhang J.Classification of Android apps and malware using deep neural networks[C]∥Proc of 2017 International Joint Conference on Neural Networks (IJCNN),2017:1871-1878.
|
[7] |
Mclaughlin N,Martinez J,Kang B,et al.Deep android malware detection[C]∥Proc of the 7th ACM Conference on Data and Application Security and Privacy,2017:301-308.
|
[8] |
Yerima S,Sezer S,Mcwilliams G.Analysis of Bayesian classification-based approaches for Android malware detection[J].IET Information Security,2014,8(1):25-36.
|
[9] |
Wang W,Li Y,Wang X,et al.Detecting Android malicious apps and categorizing benign apps with ensemble of classi- fiers[J].Future Generation Computer Systems,2018,78(3):987-994.
|
[10] |
Shabtai A,Fledel Y,Elovici Y.Automated static code analysis for classifying android applications using machine lear- ning[C]∥Proc of 2010 International Conference on Computational Intelligence and Security,2010:329-333.
|
[11] |
Buennemeyer T,Nelson T,Clagett L,et al.Mobile device profiling and intrusion detection using smart batteries[C]∥Proc of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008),2008:296.
|
[12] |
Martinelli F, Marulli F, Mercaldo F. Evaluating convolu- tional neural network for effective mobile malware detection[J].Procedia Computer Science,2017,112:2372-2381.
|
[13] |
Vinod P,Zemmari A,Conti M.A machine learning based approach to detect malicious android apps using discriminant system calls[J].Future Generation Computer Systems,2019,94:333-350.
|
[14] |
Liang H,Song Y,Xiao D.An end-to-end model for Android malware detection[C]∥Proc of 2017 IEEE International Conference on Intelligence and Security Informatics (ISI),2017:140-142.
|
[15] |
Ke Dong-xiang,Pan Li-min,Luo Sen-lin,et al. Android malicious behavior recognition and classification method based on random forest algorithm[J].Journal of Zhejiang University (Engineering Science),2019,53 (10):2013-2023.(in Chinese)
|
[16] |
Fang Q,Yang X,Ji C.A hybrid detection method for Android malware[C]∥Proc of 2019 IEEE 3rd Information Technology,Networking,Electronic and Automation Control Conference (ITNEC),2019:2127-2132.
|
[17] |
Alshahrani H,Mansourt H,Thorn S,et al.DDefender:Android application threat detection using static and dynamic analysis[C]∥
|
|
Proc of 2018 IEEE International Conference on Consumer Electronics (ICCE),2018:1-6.
|
[18] |
Xu L,Zhang D,Jayasena N,et al.HADM:Hybrid analysis for detection of malware[C]∥Proc of SAI Intelligent Systems Conference,2017:702-724.
|
[19] |
Vinayakumar R,Soman K,Poornachandran P,et al.Detecting Android malware using long short-term memory (LSTM)[J].Journal of Intelligent & Fuzzy Systems,2018,34(3):1277-1288.
|
[20] |
Arp D,Spreitzenbarth M,Hubner M,et al.DREBIN:Effective and explainable detection of android malware in your pocket[C]∥Proc of Network and Distributed System Security Symposium (NDSS),2014:23-26.
|
[21] |
Zhang Y,Yang Y,Wang X.A novel android malware detection approach based on convolutional neural network[C]∥Proc of the 2nd International Conference on Cryptography,Security and Privacy,2018:144-149.
|
[22] |
Luo S,Tian S,Yu L,et al.Android malicious code classification using deep belief network[J].KSII Transactions on Internet and Information Systems,2018,12(1):454-475.
|
[23] |
Wang W,Gao Z,Zhao M,et al.DroidEnsemble:Detecting Android malicious applications with ensemble of string and structural static features[J].IEEE Access,2018,6:31798-31807.
|
[24] |
Arshad S,Shah M A,Wahid A,et al.SAMADroid:A novel 3-level hybrid malware detection model for android opera- ting system[J].IEEE Access,2018,6:4321-4339.
|
[25] |
Wang W,Zhao M,Wang J.Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network[J].Journal of Ambient Intelligence and Humanized Computing,2019,10(8):3035-3043.
|
[26] |
Qamar A,Karim A,Chang V.Mobile malware attacks:Review,taxonomy & future directions[J].Future Generation Computer Systems,2019,97:887-909.
|
[27] |
Deepa K,Radhamani G,Vinod P.Investigation of feature selection methods for Android malware analysis[J].Procedia Computer Science,2015,46(6):841-848.
|
[28] |
Coronado-De-Alba L D, Rodríguez-Mota A,Escamilla- Ambrosio P J. Feature selection and ensemble of classifiers for Android malware detection[C]∥Proc of 2016 8th IEEE Latin-American Conference on Communications (LATINCOM),2016:1-6.
|
[29] |
Zhao K,Zhang D,Su X,et al.Fest:A feature extraction and selection tool for Android malware detection[C]∥Proc of 2015 IEEE Symposium on Computers and Communication (ISCC),2015:714-720.
|
[30] |
Satterthwaite F E.An approximate distribution of estimates of variance components[J].Biometrics Bulletin,1946,2(6):110-114.
|
[31] |
Kent J T.Information gain and a general measure of correlation[J].Biometrika,1983,70(1):163-173.
|
[32] |
Hou S,Saas A,Ye Y,et al.DroidDelver:An Android malware detection system using deep belief network based on API call blocks[C]∥
|
|
Proc of International Conference on Web-Age Information Management,2016:54-66.
|
[33] |
Hasegawa C, Iyatomi H.One-dimensional convolutional neural networks for Android malware detection[C]∥
|
|
Proc of 2018 IEEE 14th International Colloquium on Signal Processing & Its Applications (CSPA),2018:99-102.
|
[34] |
Yerima S Y, Muttik I, Sezer S.High accuracy android malware detection using ensemble learning[J].IET Information Security,2015,9(6):313-320.
|
[35] |
Li Q,Sun B,Chen M Q,et al.Detection malicious Android application based on simple-Dalvik intermediate language[J].Neural Computing and Applications,
|
20 |
19,31(S1):185-194.
|
[36] |
Kim D,Shin D,Shin D,et al.Attack detection application with attack tree for mobile system using log analysis[J].Mobile Networks and Applications,2019,24(1):184-192.
|
[37] |
Xu Lin-xi,Guo Fan. A hybrid feature-based detection me- thod on Android malware[J].Computer Engineering & Science,2017,39 (10):1837-1846.(in Chinese)
|
[38] |
Xiao X,Zhang S,Mercaldo F,et al.Android malware detection based on system call sequences and LSTM[J].Multimedia Tools and Applications,2019,78(4):3979-3999.
|
[39] |
Ma Gang,Liu Feng,Zhu Er-zhou,et al.
|
|
Detection of Android phishing site based on revised naive Bayes [J].Computer Engineering & Science,2018,40(8):1420-1428.(in Chinese)
|
|
附中文参考文献:
|
[15] |
柯懂湘,潘丽敏,罗森林,等.基于随机森林算法的Android恶意行为识别与分类方法[J].浙江大学学报(工学版),2019,53(10):2013-2023.
|
[37] |
徐林溪,郭帆.基于混合特征的恶意安卓程序检测方法[J].计算机工程与科学,2017,39(10):1837-1846.
|
[39] |
马刚,刘锋,朱二周,等.一种基于改进的朴素贝叶斯算法的Android钓鱼网站检测方案[J].计算机工程与科学,2018,40(8):1420-1428.
|