[1] |
LARRY T, BATYUK L, ACHMIDT A D.An Android application sandbox system for suspicious softwaredetection[C]//Proceedings of the 5th International Conference on Malicious and Unwanted Software, USA, 2010: 55-62.
|
[2] |
SHABTAI A, MOSKOVITCH R, ELOVICI Y.Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey[J].Information Security Technical Report, 2009, 14(1): 16-29.
|
[3] |
Barrera D, Kayacik H G.A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android[C]//Ccs Proceedings of Acm Conference on Computer & Communications Security, 2010: 73-84.
|
[4] |
FINICKEL E, LAHMADI A, BECK F, et al.Empirical Analysis of Android Logs Using Self-Organizing Maps[C]//Communications (ICC), 2014 IEEE International Conference on, Sydney, 2014: 1802-1807.
|
[5] |
Google Android[EB/OL]. , 2013-03-25.
|
[6] |
LLOYD S.Least squares quantization in pcm[J]. IEEE Transactions on Information Theory, 1982, 28(2): 129-136.
|
[7] |
DINI I, MARTINELLI F, SARACINO A.MADAM: A multi—level anomaly detector for android malware[C]//Proceedings of the 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security: Computer Network Security, Berlin Heidelberg, 2012: 240-253.
|
[8] |
Isohara T, Takemori K, Kubota A.Kernel—based behavior analysis for Android malware detection[C]//Computational Intelligence and Security (CIS), 2011 Seventh International Conference on, IEEE, Sanya, 2011:1011-1015.
|
[9] |
MUTZ D, VALEUR F, VIGNA G.Anomalous system call detection[J]. ACM Transactions on Information and System Security, 2006, 9(1): 61-93.
|
[10] |
FEIZOLLAH A, ANUAR N B, SALLEH R, et al.Comparative study of k-means and mini batch k-means clustering algorithms in android malware detection using network traffic analysis[C]//Biometrics and Security Technologies (ISBAST), 2014 International Symposium on, Kuala Lumpur, 2014: 193-197.
|
[11] |
UMRATKARM S, KARNEWAR J.K-Means Algorithm for Selective Filtration of Malicious Android Mobile Applications[J]. International Journal of Advent Research in Computer & Electronics, 2014, 1(3):5-12.
|
[12] |
YALCIN B, TASDEMIR K. The use of K-means++ for approximate spectral clustering of large datasets[C]//Signal Processing and Communications Applications Conference (SIU), 2014: 220-223.
|