2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC) 2013
DOI: 10.1109/iwcmc.2013.6583806
|View full text |Cite
|
Sign up to set email alerts
|

Applying machine learning classifiers to dynamic Android malware detection at scale

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
88
1

Year Published

2014
2014
2019
2019

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 150 publications
(89 citation statements)
references
References 16 publications
0
88
1
Order By: Relevance
“…Many of our classifiers exhibit higher values of both precision and recall than theirs. In 2013, Amos et al (2013) leveraged dynamic application profiling in their malware detector. The evaluation metrics of their 10-Fold experiment are slightly lowers than ours.…”
Section: Related Workmentioning
confidence: 99%
“…Many of our classifiers exhibit higher values of both precision and recall than theirs. In 2013, Amos et al (2013) leveraged dynamic application profiling in their malware detector. The evaluation metrics of their 10-Fold experiment are slightly lowers than ours.…”
Section: Related Workmentioning
confidence: 99%
“…Using permissions and API calls as features, Wu et al [25] performed their experiments on a dataset of 1 500 goodware and 238 malware. In 2013, Amos et al [26] leveraged dynamic application profiling in their malware detector. Demme et al [27] also used dynamic application analysis to perform malware detection with a dataset of 210 goodware and 503 malware.…”
Section: Malware Detection and Assessmentsmentioning
confidence: 99%
“…Another framework employing machine learning was introduced in 2013 [15]. This paper evaluates a number of existing classifiers that use machine learning, using a dataset containing thousands of real applications.…”
Section: Previous Workmentioning
confidence: 99%