|
[1] IDC: Smartphone OS Market Share 2016, 2015, retrieved from http://www.idc.com/promo/smartphone-market-share/os [2] M. La Polla, F. Martinelli, and D. Sgandurra, “A Survey on Security for Mobile Devices,” IEEE Commun. Surv. Tutorials, vol. 15, no. 1, pp. 446–471, 2013. [3] Cheng, Chien-Wen, “Identifying potentially malicious behavior inside android malware by static code analysis”, 2013, retrieved from http://handle.ncl.edu.tw/11296/ndltd/44175699278460400644 [4] Artificial neural network-Wikipedia, https://en.wikipedia.org/wiki/Artificial_neural_network [5] CS231n Convolutional Neural Networks for Visual Recognition, retrieved from http://cs231n.github.io/convolutional-networks/ [6] Overfitting-Wikipedia, retrieved from https://en.wikipedia.org/wiki/Overfitting [7] Rectifier(neural networks)-Wikipedia, retrieved from https://en.wikipedia.org/wiki/Rectifier_(neural_networks) [8] G. Suarez-Tangil, J. E. Tapiador, P. Peris-Lopez, and J. B. Alis, “Dendroid: A text mining approach to analyzing and classifying code structures in android malware families,” Expert Systems with Applications, 2013, in Press. [9] Q. Li and X. Li. Android malware detection based on static analysis of characteristic tree. In Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2015 International Conference on, pages 84–91. IEEE, 2015 [10] D. Arp, M. Spreitzenbarth, H. Malte, H. Gascon, and K. Rieck, “Drebin: Effective and Explainable Detection of Android Malware in Your Pocket,” Symp. Netw. Distrib. Syst. Secur., pp. 23–26, 2014. [11] H. Gascon, F. Yamaguchi, D. Arp, and K. Rieck, “Structural detection of android malware using embedded call graphs,” Proc. 2013 ACM Work. Artif. Intell. Secur. - AISec ’13, pp. 45–54, 2013. [12] Y. J. Ham and H.-W. Lee, “Detection of Malicious Android Mobile Applications Based on Aggregated System Call Events,” Int. J. Comput. Commun. Eng., vol. 3, no. 2, pp. 149–154, 2014 [13] G. Suarez-Tangil, J. E. Tapiador, P. Peris-Lopez, and J. Blasco, “Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families,” Expert Syst. Appl., vol. 41, no. 4 PART 1, pp. 1104–1117, 2014. [14] SimHash-Wikipedia, retrieved from https://en.wikipedia.org/wiki/SimHash [15] DJB2-Wikipedia, retrieved from https://en.wikipedia.org/wiki/DJB2 [16] djb2-hashfunction, retrieved from http://www.cse.yorku.ca/~oz/hash.html [17] Rabin fingerprint-Wikipedia, retrieved from https://en.wikipedia.org/wiki/Rabin_fingerprint [18] “ColourFormats.” [Online]. Available: http://www.equasys.de/colorformat.html. [Accessed: 12-Aug-2015]. [19] K. Han, J. H. Lim, and E. G. Im, “Malware analysis method using visualization of binary files,” Proc. 2013 Res. Adapt. Converg. Syst., pp. 317–321, 2013. [20] L. Nataraj, S. Karthikeyan, G. Jacob, and B. S. Manjunath, “Malware images: visualization and automatic classification,” Proc. 8th Int. Symp. Vis. Cyber Secur., p. 4, 2011. [21] K. Kancherla and S. Mukkamala, “Image visualization based malware detection,” Proc. 2013 IEEE Symp. Comput. Intell. Cyber Secur. CICS 2013 - 2013 IEEE Symp. Ser. Comput. Intell. SSCI 2013, pp. 40–44, 2013. [22] K. S. Han, J. H. Lim, B. Kang, and E. G. Im, “Malware analysis using visualized images and entropy graphs,” Int. J. Inf. Secur., pp. 1–14, 2014. [23] S. Z. M. Shaid and M. A. Maarof, “Malware Behavior Image for Malware Variant Identification,” 2014 Int. Symp. Biometric Secur. Technol., pp. 238–243, 2014. [24] Apktool, retrieved from https://ibotpeaches.github.io/Apktool/ [25] sourceforge-dex2jar, retrieved from https://sourceforge.net/p/dex2jar/wiki/Home/ [26] JAR(file format)-Wikipedia, retrieved from https://en.wikipedia.org/wiki/JAR_(file_format) [27] Ajit Kumar, K Pramod Sagar, K. S. Kuppusamy, and G. Aghila, “Machine learning based malware classification for Android applications using multimodal image representations”, Intelligent Systems and Control (ISCO), 2016 10th International Conference on, 2016 [28] Decision tree-Wikipedia, retrieved from https://en.wikipedia.org/wiki/Decision_tree [29] Random forest-Wikipedia, retrieved from https://en.wikipedia.org/wiki/Random_forest [30] k-nearest neighbors-Wikipedia, retrieved from https://en.wikipedia.org/wiki/K-nearest_neighbors_algorithm [31] Caffe-Deep Learning Framework, retrieved from http://caffe.berkeleyvision.org/
|