Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Mar 27, 2017 · In this paper, we propose DAPASA, an approach to detect Android piggybacked apps through sensitive subgraph analysis. Two assumptions are ...
: DAPASA: DETECTING ANDROID PIGGYBACKED APPS THROUGH SENSITIVE SUBGRAPH ANALYSIS. 1777 malicious apps and rarely used by benign apps. This condition reflects ...
Aug 1, 2017 · In this paper, we propose DAPASA, an approach to detect Android piggybacked apps through sensitive subgraph analysis. Two assumptions are ...
In this work, we propose DAPASA, an approach to detect Android piggybacked apps through sensitive subgraph analysis. Two assumptions are established to reflect ...
DAPASA, an approach to detect Android piggybacked apps through sensitive subgraph analysis, is proposed and exhibits an impressive detection performance ...
M Fan et al. Dapasa: detecting android piggybacked apps through sensitive subgraph analysis[J] ... Apposcopy: Semantics based detection of Android malware through ...
May 13, 2023 · [16] proposed an approach to detect Android piggybacked apps called DAPASA. They extracted sensitive subgraphs (SSGs) using the tf–idf-like ...
DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis ... detect Android piggybacked apps through sensitive subgraph analysis. Two ...
Dapasa: detecting android piggybacked apps through sensitive subgraph · analysis. IEEE Trans Inf Forensics Secur 2017;12(8):1772–85. Google. Shrink your code ...
Apr 7, 2021 · In this work, we propose DAPASA, an approach to detect Android piggybacked apps ... [Show full abstract] through sensitive subgraph analysis.