[1] GHORBANZADENH M,CHEN Y,MA Z,et al. A neural network approach to category validation of Android applications[C]//International Conference on Computing,Networking and Communications. San Diego:IEEE,2013:740-744.
[2] HAO H, LI Z, YU H. An effective approach to measuring and assessing the risk of Android application[C]//International Symposium on Theoretical Aspects of Software Engineering. Nanjing:IEEE,2015:31-38.
[3] 魏松杰,杨铃.基于分层API调用的Android恶意代码静态描述方法[J].计算机科学,2015,42(1):155-158. WEI Song-jie,YANG Ling. Android malware characterization based on static analysis of hierarchical API usage[J]. Computer Science,2015,42(1):155-158.
[4] CHUANG H Y, WANG S D. Machine learning based hybrid behavior models for Android malware analysis[C]//IEEE International Conference on Software Quality, Reliability and Security. Vancouver:IEEE,2015:201-206.
[5] WANG H, GUO Y, TANG Z, et al. Reevaluating Android permission gaps with static and dynamic analysis[C]//2015 IEEE Global Communications Conference. San Diego:IEEE,2015:1-6.
[6] KURNIAWAN H,ROSMANSYAH Y,DABARSYAH B. Android anomaly detection system using machine learning classification[C]//International Conference on Electrical Engineering and Informatics. Denpasar:IEEE, 2015:288-293.
[7] TENENBOIM-CHEKINA L,BARAD O,SHABTAI A,et al. Detecting application update attack on mobile devices through network features[C]//INFOCOM. Turin:IEEE,2013:91-92.
[8] HAM H S, CHOI M J. Analysis of Android malware detection performance using machine learning classifiers[C]//International Conference on ICT Convergence. Jeju:IEEE,2013:490-495.
[9] 王蕊,冯登国,杨轶,等.基于语义的恶意代码行为特征提取及检测方法[J].软件学报,2012,23(2):378-393. WANG Rui,FENG Deng-guo,Yang Yi,et al. Semantics-Based malware behavior signature extraction and detection method[J]. Journal of Software,2012,23(2):378-393.
[10] SU X,ZHANG D,LI W,et al. Android app recommendation approach based on network traffic measurement and analysis[C]//IEEE Symposium on Computers & Communication. Larnaca:IEEE,2015:988-994.
[11] HOCHREITER S,SCHMIDHUBER J. Long short-term memory[J]. Neural Computation,1997,9(8):1735-1780.
[12] STAUDEMEYER R C,OMLIN C W. Evaluating performance of long short-term memory recurrent neural networks on intrusion detection data[C]//South African Institute for Computer Scientists and Information Technologists Conference. East London:ACM,2013:218-224.
[13] KIM J,KIM J,THU H L T,et al. Long short term memory recurrent neural network classifier for intrusion detection[C]//International Conference on Platform Technology and Service. Jeju:IEEE,2016:1-5.
[14] BURGUERA I, ZURUTUZA U, NADJM-TEHRANI S. Crowdroid:behavior-based malware detection system for Android[C]//ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. Chicago:ACM,2011:15-26.
[15] BLASING T,BATYUK L,SCHMIDT A D,et al. An Android application sandbox system for suspicious software detection[C]//International Conference on Malicious and Unwanted Software. Nancy:IEEE,2010:55-62.
[16] SANZ B,SANTOS I,LAORDEN C,et al. On the automatic categorization of Android applications[C]//9th IEEE Consumer Communications and NETWORKING Conference. Las Vegas:IEEE,2012:149-153.
[17] XIAO X,LI Q,JIANG Y,et al. Back-propagation neural network on Markov chains from system call sequences:a new approach for detecting Android malware with system call sequences[J]. Iet Information Security, 2016, 11(1):8-15.
[18] WEI S,WU G,ZHOU Z,et al. Mining network traffic for application category recognition on Android platform[C]//2015 IEEE International Conference on Progress in Informatics and Computing (PIC). Nanjing:IEEE,2015:409-413.
[19] WU G,WEI S,LUO N,et al. Capturing and characterizing network actions of mobile applications for behavior consistency[C]//2015 International Conference on Computing and Network Communications (CoCoNet). Trivandrum:IEEE,2015:898-905.
[20] 魏松杰,吴高翔,罗娜,等.DroidBet:事件驱动的Android应用网络行为的自动检测系统[J].通信学报,2017,38(5):84-95. WEI Song-jie,WU Gao-xiang,LUO Na,et al. DroidBet:event-driven automatic detection of network behaviors for Android applications[J]. Journal on Communications,2017,38(5):84-95. |