Application of clustering methods for analyzing the security of Android applications


如何引用文章

全文:

开放存取 开放存取
受限制的访问 ##reader.subscriptionAccessGranted##
受限制的访问 订阅存取

详细

This paper presents the results from developing the system for detecting malicious Android applications based on the fuzzy clustering method. We have described the format of the application feature vector, as well as presented studies on the effectiveness of using different criteria for separability. The high efficiency of the proposed approach has been experimentally confirmed.

作者简介

E. Pavlenko

Peter the Great St. Petersburg Polytechnic University

编辑信件的主要联系方式.
Email: jekon92@mail.ru
俄罗斯联邦, St. Petersburg

A. Yarmak

Peter the Great St. Petersburg Polytechnic University

Email: jekon92@mail.ru
俄罗斯联邦, St. Petersburg

D. Moskvin

Peter the Great St. Petersburg Polytechnic University

Email: jekon92@mail.ru
俄罗斯联邦, St. Petersburg

补充文件

附件文件
动作
1. JATS XML

版权所有 © Allerton Press, Inc., 2017