2017 3rd IEEE International Conference on Computer and Communications (ICCC) 2017
DOI: 10.1109/compcomm.2017.8322742
|View full text |Cite
|
Sign up to set email alerts
|

A detecting method for malicious mobile application based on incremental SVM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…Also, ContagioDump, VirusTotal, and VirusShare were also employed for malware samples. However, in this SLR study, VirusShare [68], [63], [76], [86], [97], [102], [107], [117], [120], [58], [116] is found as the most popular dataset used in their experiments, followed by DREBIN, [67], [72], [80], [87], [88], [108], [109], [62], [64] Malware Genome Project, [114], [115], [64], [74], [112], [118], Google Play Store, [64], [74], [85], [115], [114] and many more type of datasets as shown in TABLE 14 in Appendix A.…”
Section: ) Classification By Datasetmentioning
confidence: 85%
See 2 more Smart Citations
“…Also, ContagioDump, VirusTotal, and VirusShare were also employed for malware samples. However, in this SLR study, VirusShare [68], [63], [76], [86], [97], [102], [107], [117], [120], [58], [116] is found as the most popular dataset used in their experiments, followed by DREBIN, [67], [72], [80], [87], [88], [108], [109], [62], [64] Malware Genome Project, [114], [115], [64], [74], [112], [118], Google Play Store, [64], [74], [85], [115], [114] and many more type of datasets as shown in TABLE 14 in Appendix A.…”
Section: ) Classification By Datasetmentioning
confidence: 85%
“…This method is essentially a manual comparison of some systems' typical actions. Lowering the , [55], [58], [59], [62], [63], [65], [68], [72], [73], [74], [75], [78], [79], [80], [82], [86], [91], [92], [93], [95], [97], [103], [104], [106], [107], [108], [110], [111], [112], [114], [115], [116], [117], [118], [120], [122], [123], [126] Behaviorbased…”
Section: D: Specification-basedmentioning
confidence: 99%
See 1 more Smart Citation
“…Ref. [181] adopts the incremental SVM algorithm to make full use of the prior information of historical samples. It avoids retraining all the data when new samples are added, thus improving detection efficiency.…”
Section: ) Machine Learning Models and Algorithms Used In Android Mamentioning
confidence: 99%
“…[3], [88], [100]- [103], [105], [107]- [109], [113]- [117], [119], [121], [136], [137], [139], [140], [143], [147], [151]- [153], [155], [157], [162], [166], [167], [169], [175]- [177], [179]- [181], [183], [187], [189], [190], [192], [193], [195], [202], [207], [212]- [216] K-Nearest Neighbors (KNN)…”
Section: ) Machine Learning Models and Algorithms Used In Android Mamentioning
confidence: 99%