[1] 卿斯汉. Android安全研究进展[J]. 软件学报, 2016, 27(1):45-71.(QING S H. Research progress on Android security[J]. Journal of Software, 2016, 27(1):45-71.) [2] 张怡婷, 张扬, 张涛, 等. 基于朴素贝叶斯的Android软件恶意行为智能识别[J]. 东南大学学报(自然科学版), 2015, 45(2):224-230.(ZHANG Y T, ZHANG Y, ZHANG T, et al. Intelligent identification of malicious behavior in Android applications based on naive Bayes[J]. Journal of Southeast University (Natural Science Edition), 2015, 45(2):224-230.) [3] 杨欢, 张玉清, 胡予濮, 等. 基于多类特征的Android应用恶意行为检测系统[J]. 计算机学报, 2014, 37(1):15-27. (YANG H, ZHANG Y Q, HU Y P, et al. A malware behavior detection system of Android applications based on multi-class features[J]. Chinese Journal of Computers, 2014, 37(1):15-27.) [4] WOLFE B, ELISH K, YAO D. High precision screening for Android malware with dimensionality reduction[C]//ICMLA 2014:Proceedings of the 201413th International Conference on Machine Learning and Applications. Piscataway, NJ:IEEE, 2015:21-28. [5] ARORA A, PEDDOJU S K. Minimizing network traffic features for Android mobile malware detection[C]//ICDCN'17:Proceedings of the 18th International Conference on Distributed Computing and Networking. New York:ACM, 2017:Article No. 32. [6] 杨宏宇,徐晋.基于改进随机森林算法的Android恶意软件检测[J].通信学报,2017,38(4):8-16.(YANG H Y, XU J. Android malware detection based on improved random forest[J]. Journal on Communications, 2017, 38(4):8-16.) [7] 乔静静.Android未知恶意软件检测方法的研究[D].北京:北京工业大学,2013:39-48.(QIAO J J. Research of unknown malware detection on Android[D]. Beijing:Beijing University of Technology, 2013:39-48.) [8] 张巍,任环,张凯,等.基于移动软件行为大数据挖掘的恶意软件检测技术[J].集成技术,2016,5(2):29-40.(ZHANG W, REN H, ZHANG K, et al. Malware detection techniques by mining massive behavioral data of mobile Apps[J]. Journal of Integration Technology, 2016, 5(2):29-40.) [9] FEIZOLLAH A, ANUAR N B, SALLEH R, et al. A review on feature selection in mobile malware detection[J]. Digital Investigation, 2015, 13:22-37. [10] LUO Y X. Malicious detection based on ReliefF and boosting multidimensional features[J]. Journal of Communications, 2015, 10(11):910-917. [11] 丰生强.Android软件安全与逆向分析[M]. 北京:人民邮电出版社,2013:20-28.(FENG S Q. Android Software Security and Reverse Analysis[M]. Beijing:Post & Telecom Press, 2013:20-28.) [12] HE H, GARCIA E A. Learning from imbalanced data[J]. IEEE Transactions on Knowledge & Data Engineering, 2009, 21(9):1263-1284. [13] BREIMAN L. Bagging predictors[J]. Machine Learning, 1996, 24(2):123-140. [14] JIANG X, ZHOU Y. Dissecting Android malware:characterization and evolution[C]//SP'12:Proceedings of the 2012 IEEE Symposium on Security and Privacy. Washington, DC:IEEE Computer Society, 2012:95-109. [15] 袁梅宇.数据挖掘与机器学习:WEKA应用技术与实践[M].北京:清华大学出版社,2016:329-344.(YUAN M Y. Data Mining and Machine Learning:WEKA Application Technology and Practice[M]. Beijing:Tsinghua University Press, 2016:329-344.) [16] PEDREGOSA F, GRAMFORT A, MICHEL V, et al. Scikit-learn:machine learning in Python[J]. Journal of Machine Learning Research, 2011, 12(10):2825-2830. |