2019
DOI: 10.1016/j.cola.2019.03.004
|View full text |Cite
|
Sign up to set email alerts
|

Visual analytics and visualization for android security risk

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Finally, the hybrid approach defines new metrics based on a combination of different risk ranks. For instance, in [66] a risk score for permissions is defined with five sub-scores that take into account the permission frequency between benign or malicious applications, the monetary cost, the protection-level, and the relation with private information.…”
Section: Permission Risk Assessmentmentioning
confidence: 99%
“…Finally, the hybrid approach defines new metrics based on a combination of different risk ranks. For instance, in [66] a risk score for permissions is defined with five sub-scores that take into account the permission frequency between benign or malicious applications, the monetary cost, the protection-level, and the relation with private information.…”
Section: Permission Risk Assessmentmentioning
confidence: 99%
“…If there are no regularities in these comments, the algorithms cannot detect or predict any categories. In this section, we make use of visual analysis [67][68][69][70][71][72][73] to better understand student comments and to compare the degree of consistency and symmetry among the visualization results against some algorithm results. In particular, we first find some patterns in the student comments of the ITC-114 database and then visualize the keywords in these comments.…”
Section: Visualization Of Student Online Commentsmentioning
confidence: 99%
“…Smartphone users should protect their devices by setting lock screen protection, using thirdparty security applications, and choosing appropriate security settings because the default settings are often insufficient [17]. Information security breaches such as malware often activate unexpectedly [18]. Security breaches, such as planting a virus/malware, will have unpleasant consequences such as loss of productivity, theft of information assets, system downtime, damage to IT infrastructure, damage to the organization's reputation, lawsuits, fines, and regulatory action [19].…”
Section: Introductionmentioning
confidence: 99%