Information Sciences and Systems 2014 2014
DOI: 10.1007/978-3-319-09465-6_19
|View full text |Cite
|
Sign up to set email alerts
|

DroidCollector: A Honeyclient for Collecting and Classifying Android Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Clearly, if security is a critical issue this scaling factor will be set to a much larger value than the usually measured values of energy consumption per packet, and of delay per packet. The parameters S(f, e) and T (f, e) can be easily set by the arrival to the SRE from a node e that is equipped with an attack detection mechanism such as the ones described in [122] and [125]. The SP will bring to the SRE the probability of an attack on node e, P N A (e).…”
Section: B Incorporating Security In the Goal Functionmentioning
confidence: 99%
“…Clearly, if security is a critical issue this scaling factor will be set to a much larger value than the usually measured values of energy consumption per packet, and of delay per packet. The parameters S(f, e) and T (f, e) can be easily set by the arrival to the SRE from a node e that is equipped with an attack detection mechanism such as the ones described in [122] and [125]. The SP will bring to the SRE the probability of an attack on node e, P N A (e).…”
Section: B Incorporating Security In the Goal Functionmentioning
confidence: 99%
“…For example, in [15], the authors correlated the characteristics of static analysis with those of dynamic analysis. It used deep belief networks to characterize malware; In [16], the authors used permissions and system calls to model neural networks; In [17], the authors proposed a system for Android malware detection using convolutional neural network, which used the original opcode sequence of the application as a feature; In [18], the detection system used various classifiers, including deep neural networks. It allowed to enter various information, such as intentions, permissions, system commands, and API calls.…”
Section: Machine Learningmentioning
confidence: 99%
“…Furthermore, while work in [21,33] focuses on a general defensive approach against DoS attacks in future networks, signalling storm specific research can roughly be categorised in the following groups: problem definition and attacks classification [5,30,31,41]; measurements in real operating networks [11,40]; modelling and simulation [1,27]; impact of attacks on energy consumption [10,12]; attacks detection and mitigation, using counters [19,20,38], change-point detection techniques [32,42], IP packet analysis [28], randomisation in RRC's functions [45], software changes in the mobile terminal [8,34], monitoring terminal's bandwidth usage [39], and detection using techniques from Artificial Intelligence [2]. As we look to the future, such as the Internet of Things (IoT), various forms of attacks will also have to be considered [6,9].…”
Section: Introductionmentioning
confidence: 99%