Journal of Engineering and Applied Sciences

Year: 2016
Volume: 11
Issue: 3
Page No. 369 - 374

References

Aamodt, A., H.A. Sandtorv and O.M. Winnem, 1998. Combining case based reasoning and data mining-A way of revealing and reusing RAMS experience. Proceedings of the European Conference on Safety and Reliability, June 16-19, 1998, Trondheim, Norway, pp: 1345-1351.

Berkat, A., 2011. Using Case-Based Reasoning (CBR) for detecting computer virus. Int. J. Comput. Sci. Issues, 8: 606-610.
Direct Link  |  

Blasing, T., L. Batyuk, A.D. Schmidt, S.A. Camtepe and S. Albayrak, 2010. An android application sandbox system for suspicious software detection. Proceedings of the 5th International Conference on Malicious and Unwanted Software, October 19-20, 2010, Nancy, Lorraine, pp: 55-62.

Blondel, V.D., A. Decuyper and G. Krings, 2015. A survey of results on mobile phone datasets analysis. EPJ Data Sci., Vol. 4. 10.1140/epjds/s13688-015-0046-0

Esmaili, M., B. Balachandran, R. Safavi-Naini and J. Pieprzyk, 1996. Case-based reasoning for intrusion detection. Proceedings of the 12th Annual Computer Security Applications Conference, December 9-13, 1996, San Diego, CA., USA., pp: 214-223.

F-Secure, 2014. Mobile threat report. https://www.f-secure.com/documents/996508/1030743/Mobile_Threat_Report_Q1_2014.pdf.

Fanoiki, T.O., I. Drummond and S. Sandri, 2010. Case-based reasoning retrieval and reuse using case resemblance hypergraphs. Proceedings of the IEEE International Conference on Fuzzy Systems, July 18-23, 2010, Barcelona, Spain, pp: 1-7.

Hu, X., 2011. Large-scale malware analysis, detection and signature generation. Ph.D. Thesis, The University of Michigan.

Hu, X., T. Chiueh and K.G. Shin, 2009. Large-scale malware indexing using function-call graphs. Proceedings of the 16th ACM conference on Computer and Communications Security, November 9-13, 2009, Chicago, IL., USA., pp: 611-620.

Micarelli, A. and G. Sansonetti, 2007. A case-based approach to anomaly intrusion detection. Proceedings of the 5th International Conference on Machine Learning and Data Mining in Pattern Recognition, July 18-20, 2007, Leipzig, Germany, pp: 434-448.

Park, Y., D. Reeves, V. Mulukutla and B. Sundaravel, 2010. Fast malware classification by automated behavioral graph matching. Proceedings of the 6th Annual Workshop on Cyber Security and Information Intelligence Research, April 21-23, 2010, Oak Ridge, TN., USA., pp: 1-4.

Sanz, B., I. Santos, X. Ugarte-Pedrero, C. Laorden, J. Nieves and P.G. Bringas, 2014. Anomaly detection using string analysis for android malware detection. Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, September 11-13, 2013, Salamanca, Spain, pp: 469-478.

Saudi, M.M., F. Ridzuan, N. Basir, N.F. Nabila, S.A. Pitchay and I.N. Ahmad, 2015. Android mobile malware surveillance exploitation via call logs: Proof of concept. Proceedings of the 17th UKSim-AMSS International Conference on Modelling and Simulation, March 25-27, 2015, Cambridge, UK., pp: 176-181.

Wang, X., Y. Yang and Y. Zeng, 2015. Accurate mobile malware detection and classification in the cloud. SpringerPlus, Vol. 4. 10.1186/s40064-015-1356-1

Wang, Y., J. Zheng, C. Sun and S. Mukkamala, 2013. Quantitative security risk assessment of android permissions and applications. Proceedings of the IFIP 27th Annual Conference on Data and Applications Security and Privacy, July 15-17, 2013, Newark, NJ., USA., pp: 226-241.

Wei, X., L. Gomez, I. Neamtiu and M. Faloutsos, 2012. ProfileDroid: multi-layer profiling of android applications. Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, August 22-26, 2012, Istanbul, Turkey, pp: 137-148.

Wu, D.J., C.H. Mao, T.E. Wei, H.M. Lee and K.P. Wu, 2012. DroidMat: Android malware detection through manifest and API calls tracing. Proceedings of the 7th Asia Joint Conference on Information Security, August 9-10, 2012, Tokyo, pp: 62-69.

Zakaria, W.Z.A., 2015. Application of case based reasoning in IT security incident response. Proceedings of the 3rd International Conference Recent treads in Engineering and Technology, September 2-3, 2015, Istanbul, Turkey -.

Zhao, M., F. Ge, T. Zhang and Z. Yuan, 2011. AntiMalDroid: An efficient SVM-based malware detection framework for Android. Proceedings of the 2nd International Conference on Information Computing and Applications, October 28-31, 2011, Qinhuangdao, China, pp: 158-166.

Zhou, Y. and X. Jiang, 2012. Dissecting android malware: Characterization and evolution. Proceedings of the IEEE Symposium on Security and Privacy, May 20-23, 2012, San Francisco, California, pp: 95-109.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved