Normal and Malicious Application Pattern Analysis using System Call Event on Android Mobile Devices for Similarity Extraction
You Joung Ham, Hyung-Woo Lee, Journal of Internet Computing and Services, Vol. 14, No. 6, pp. 125-0, Dec. 2013
10.7472/jksii.2013.14.6.125, Full Text:
Keywords: Android, Normal and Malicious Application, System call events, pattern analysis, Similarity Analysis
Abstract
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[APA Style]
Ham, Y. & Lee, H. (2013). Normal and Malicious Application Pattern Analysis using System Call Event on Android Mobile Devices for Similarity Extraction. Journal of Internet Computing and Services, 14(6), 125-0. DOI: 10.7472/jksii.2013.14.6.125.
[IEEE Style]
Y. J. Ham and H. Lee, "Normal and Malicious Application Pattern Analysis using System Call Event on Android Mobile Devices for Similarity Extraction," Journal of Internet Computing and Services, vol. 14, no. 6, pp. 125-0, 2013. DOI: 10.7472/jksii.2013.14.6.125.
[ACM Style]
You Joung Ham and Hyung-Woo Lee. 2013. Normal and Malicious Application Pattern Analysis using System Call Event on Android Mobile Devices for Similarity Extraction. Journal of Internet Computing and Services, 14, 6, (2013), 125-0. DOI: 10.7472/jksii.2013.14.6.125.