Exploring the potential of big data for malware detection and mitigation techniques in the android environment
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hussain, Rasheed | - |
dc.contributor.author | Kim, Donghyun | - |
dc.contributor.author | Nogueira, Michele | - |
dc.contributor.author | Son, Junggab | - |
dc.contributor.author | Oh, Heekuck | - |
dc.date.accessioned | 2021-06-22T18:22:26Z | - |
dc.date.available | 2021-06-22T18:22:26Z | - |
dc.date.created | 2021-01-22 | - |
dc.date.issued | 2016-04 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/16001 | - |
dc.description.abstract | [No abstract available] | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | CRC Press | - |
dc.title | Exploring the potential of big data for malware detection and mitigation techniques in the android environment | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Oh, Heekuck | - |
dc.identifier.scopusid | 2-s2.0-85052181409 | - |
dc.identifier.bibliographicCitation | Big Data: Storage, Sharing, and Security, pp.397 - 430 | - |
dc.relation.isPartOf | Big Data: Storage, Sharing, and Security | - |
dc.citation.title | Big Data: Storage, Sharing, and Security | - |
dc.citation.startPage | 397 | - |
dc.citation.endPage | 430 | - |
dc.type.rims | ART | - |
dc.type.docType | Book Chapter | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Android (operating system) | - |
dc.subject.keywordPlus | Malware | - |
dc.subject.keywordPlus | Malware detection | - |
dc.subject.keywordPlus | Mitigation techniques | - |
dc.subject.keywordPlus | Big data | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.