共 13 条
[1]
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
[J].
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014),
2014,
[2]
Bishop C.M., 2006, Pattern recognition and machine learning, DOI DOI 10.1007/978-0-387-45528-0
[4]
Jiang LX, 2007, LECT NOTES ARTIF INT, V4632, P134
[5]
Kohavi R., 1995, INT JOINT C ART INT, V2, P1137, DOI DOI 10.1067/MOD.2000.109031
[6]
Ouinlan J.R., 1993, C4 5 PROGRAMS MACHIN
[7]
Platt JC, 1999, ADVANCES IN KERNEL METHODS, P185
[8]
Rieck K, 2008, LECT NOTES COMPUT SC, V5137, P108, DOI 10.1007/978-3-540-70542-0_6
[9]
Salzberg SL, 1994, Mach. Learn, V16, P235, DOI [DOI 10.1007/BF00993309, 10.1007/BF00993309, 10.1007/bf00993309]
[10]
Sanz B, 2013, ADV INTELL SYST COMP, V189, P289