Picture for Usue Mori

Usue Mori

Light up that Droid! On the Effectiveness of Static Analysis Features against App Obfuscation for Android Malware Detection

Add code
Oct 24, 2023
Figure 1 for Light up that Droid! On the Effectiveness of Static Analysis Features against App Obfuscation for Android Malware Detection
Figure 2 for Light up that Droid! On the Effectiveness of Static Analysis Features against App Obfuscation for Android Malware Detection
Figure 3 for Light up that Droid! On the Effectiveness of Static Analysis Features against App Obfuscation for Android Malware Detection
Figure 4 for Light up that Droid! On the Effectiveness of Static Analysis Features against App Obfuscation for Android Malware Detection
Viaarxiv icon

Towards a Fair Comparison and Realistic Design and Evaluation Framework of Android Malware Detectors

Add code
May 25, 2022
Figure 1 for Towards a Fair Comparison and Realistic Design and Evaluation Framework of Android Malware Detectors
Figure 2 for Towards a Fair Comparison and Realistic Design and Evaluation Framework of Android Malware Detectors
Figure 3 for Towards a Fair Comparison and Realistic Design and Evaluation Framework of Android Malware Detectors
Figure 4 for Towards a Fair Comparison and Realistic Design and Evaluation Framework of Android Malware Detectors
Viaarxiv icon

A review on outlier/anomaly detection in time series data

Add code
Feb 11, 2020
Figure 1 for A review on outlier/anomaly detection in time series data
Figure 2 for A review on outlier/anomaly detection in time series data
Figure 3 for A review on outlier/anomaly detection in time series data
Figure 4 for A review on outlier/anomaly detection in time series data
Viaarxiv icon

Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process

Add code
Jan 27, 2020
Figure 1 for Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process
Figure 2 for Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process
Figure 3 for Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process
Figure 4 for Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process
Viaarxiv icon

A review on distance based time series classification

Add code
Jun 12, 2018
Figure 1 for A review on distance based time series classification
Figure 2 for A review on distance based time series classification
Figure 3 for A review on distance based time series classification
Figure 4 for A review on distance based time series classification
Viaarxiv icon