“Less Give More”: Evaluate and zoning Android applications

作者: Mohd Faizal Ab Razak , Nor Badrul Anuar , Rosli Salleh , Ahmad Firdaus , Muhammad Faiz

DOI: 10.1016/J.MEASUREMENT.2018.10.034

关键词:

摘要: The Android security mechanism is the first approach to protect data, system resource as well as reduce the impact of malware. Past malware studies tend to investigate the novel …

参考文章(71)
Woongryul Jeon, Jeeyeon Kim, Youngsook Lee, Dongho Won, A Practical Analysis of Smartphone Security Lecture Notes in Computer Science. pp. 311- 320 ,(2011) , 10.1007/978-3-642-21793-7_35
Marianthi Theoharidou, Alexios Mylonas, Dimitris Gritzalis, A Risk Assessment Method for Smartphones information security conference. pp. 443- 456 ,(2012) , 10.1007/978-3-642-30436-1_36
Franklin Tchakounté, Permission-based Malware Detection Mechanisms on Android: Analysis and Perspectives Journal of Computer Science and Software Application. ,vol. 1, pp. 63- 77 ,(2014)
Tao Xie, Rahul Pandita, William Enck, Xusheng Xiao, Wei Yang, WHYPER: towards automating risk assessment of mobile applications usenix security symposium. pp. 527- 542 ,(2013)
Yang Wang, Jun Zheng, Chen Sun, Srinivas Mukkamala, Quantitative Security Risk Assessment of Android Permissions and Applications Lecture Notes in Computer Science. pp. 226- 241 ,(2013) , 10.1007/978-3-642-39256-6_15
Gianluca Dini, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Andrea Saracino, Daniele Sgandurra, A Multi-criteria-Based Evaluation of Android Applications international conference on trusted systems. pp. 67- 82 ,(2012) , 10.1007/978-3-642-35371-0_7
M. Boukhtouta, A., Mouheb, D., Debbabi, M., Alfandi, O., Iqbal, F. and El Barachi, Graph-theoretic characterization of cyber-threat infrastructures Digital Investigation. ,vol. 14, ,(2015) , 10.1016/J.DIIN.2015.05.002
David L Olson, David L Olson, The Analytic Hierarchy Process Decision Aids for Selection Problems. pp. 49- 68 ,(1996) , 10.1007/978-1-4612-3982-6_5
Thomas Lederm, Nathan L. Clarke, Risk assessment for mobile devices trust and privacy in digital business. pp. 210- 221 ,(2011) , 10.1007/978-3-642-22890-2_18
Steven Furnell, Nathan Clarke, Nor Badrul Anuar, Maria Papadakil, A Risk Index Model for Security Incident Prioritisation ,(2011) , 10.4225/75/57B52A66CD8B5