2013 IEEE Ninth World Congress on Services 2013
DOI: 10.1109/services.2013.77
|View full text |Cite
|
Sign up to set email alerts
|

Research of Intrusion Detection System on Android

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…Yuan et al . propose a malware detection framework for Android systems. The framework consists of the following components: (i) the data extraction module; (ii) the data analysis engine; and (iii) the response module.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Yuan et al . propose a malware detection framework for Android systems. The framework consists of the following components: (i) the data extraction module; (ii) the data analysis engine; and (iii) the response module.…”
Section: Related Workmentioning
confidence: 99%
“…As in Yuan et al . , the dataset uses different system metrics such as the CPU usage, the battery consumption, the number of running processes, and the network traffic via Wi‐Fi. Four experiments are performed using 40 benign applications (20 games and 20 tools) and four proof‐of‐concept malicious applications.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The system implements WiFi scanning [6], router tracking, port scanning [7], running service detection [8], virus killing [9], real-time communication [10], etc. to provide the real-time protection of mobile terminals [11].…”
Section: Introductionmentioning
confidence: 99%