[1] Zhou Yajin, Jiang Xuxuan. Dissecting android malware:characterization and evolution[C]//Security and Privacy(SP), 2012 IEEE Symposium on. San Francisco:IEEE, 2012:95-109.
[2] Mitchell T. Machine learning[M]. Beijing:China Machine Press, 2012:112-136.
[3] Harrington P. Machine learning in action[M]. New York:Manning Publications Co Development, 2013:62-82.
[4] Davis J, Goadrich M. The relationship between precision-recall and ROC curves[C]//Proceedings of the 23rd International Conference on Machine Learning. New York:ACM, 2006:233-240.
[5] Felt A P, Chin E, Hanna S, et al. Android permissions demystified[C]//Proceedings of the 18th ACM Conference on Computer and Communications Security. New York:ACM, 2011:627-638.
[6] Feizollah A, Anuar N B, Salleh R, et al. A review on feature selection in mobile malware detection[J]. Digital Investigation, 2015, 13:22-37.
[7] Cen Lei, Gates C S, Si Luo, et al. A probabilistic discriminative model for android malware detection with decompiled source code[J]. Dependable and Secure Computing, IEEE Transactions on, 2015, 12(4):400-412. |