Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
The rise of Android malware poses a significant threat to users' information security and privacy. Malicious software can inflict severe harm on users by employing various tactics, including deception, personal information theft, and device control. To address this issue, both academia and industry are continually engaged in research and development efforts focused on detecting and countering Android malware.
Dr. Weina Niu is an associate professor and master's supervisor in the School of Computer Science and Engineering (School of Cyberspace Security), University of Electronic Science and Technology of China. He has published many papers in international academic journals/conferences on key issues in malicious traffic analysis, malicious code detection, and log anomaly detection; he has served as a reviewer for several well-known academic journals in the field of network security. He is currently the deputy director of the 5G Application Innovation Joint Laboratory of China Mobile (Chengdu) Industrial Research Institute and the Institute of Cyberspace Security of the University of Electronic Science and Technology of China.
Dr. Xiaosong Zhang is a professor and doctoral supervisor in the School of Computer Science and Engineering (School of Cyberspace Security) at the University of Electronic Science and Technology of China and serves as the Dean ofthe School of Cyberspace Security. Prof. Zhang has long been devoted to basic research, technology research, and talent training in the field of information technology and security, carrying out systematic and innovative research around core issues in software and network security, big data, and blockchain security and applications. He is currently the deputy director of the Network Security Committee of the Sichuan Electronics Society and the deputy director of the Blockchain Branch of the Chinese Electronics Society. He has published many academic papers in top academic conferences and journals such as CCS, NDSS, TSE, TIFS, etc. He has published and translated several monographs related to cybersecurity.
Ran Yan is currently a PhD student majoring in Cybersecurity in the School of Computer Science and Engineering at the University of Electronic Science and Technology of China (UESTC). His research focus is on evasion technology of Android malware.
Gong Jiacheng is currently a PhD student majoring in Cybersecurity in the School of Computer Science and Engineering at the University of Electronic Science and Technology of China (UESTC). His research focus is on intelligent detection of Android malware.
Chapter1: Introduction of Android malware detection.-Chapter2: Feature Code Based Android Malware Detection Method.-Chapter3: Behavior based detection method for Android malware.-Chapter4: AI-Based Android Malware Detection Methods.-Chapter5: Static adversarial method.-Chapter6: Dynamic Adversarial Method in Android.-Chapter7: AI-based Adversarial Method in Android.-Chapter8: Future Trends in Android Malware Detection
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.