000
|
|
nam5i |
001
|
|
2210080934175 |
003
|
|
DE-He213 |
005
|
|
20250321105341 |
007
|
|
cr nn 008mamaa |
008
|
|
240523s2024 si | s |||| 0|eng d |
020
|
|
▼a9789819714599▼9978-981-97-1459-9 |
024
|
|
▼a10.1007/978-981-97-1459-9▼2doi |
040
|
|
▼a221008 |
050
|
|
▼aTK5105.59 |
072
|
|
▼aUTN▼2bicssc |
072
|
|
▼aCOM043050▼2bisacsh |
072
|
|
▼aUTN▼2thema |
082
|
|
▼a005.8▼223 |
100
|
|
▼aNiu, Weina.▼eauthor.▼4aut▼4http://id.loc.gov/vocabulary/relators/aut |
245
|
00 |
▼aAndroid Malware Detection and Adversarial Methods▼h[electronic resource] /▼cby Weina Niu, Xiaosong Zhang, Ran Yan, Jiacheng Gong. |
250
|
|
▼a1st ed. 2024. |
264
|
|
▼aSingapore :▼bSpringer Nature Singapore :▼bImprint: Springer,▼c2024. |
300
|
|
▼aXIV, 190 p. 5 illus.▼bonline resource. |
336
|
|
▼atext▼btxt▼2rdacontent |
337
|
|
▼acomputer▼bc▼2rdamedia |
338
|
|
▼aonline resource▼bcr▼2rdacarrier |
347
|
|
▼atext file▼bPDF▼2rda |
520
|
|
▼aThe rise of Android malware poses a significant threat to users’ information security and privacy. Malicious software can inflict severe harm on users by employing various tactics, including deception, personal information theft, and device control. To address this issue, both academia and industry are continually engaged in research and development efforts focused on detecting and countering Android malware. This book is a comprehensive academic monograph crafted against this backdrop. The publication meticulously explores the background, methods, adversarial approaches, and future trends related to Android malware. It is organized into four parts: the overview of Android malware detection, the general Android malware detection method, the adversarial method for Android malware detection, and the future trends of Android malware detection. Within these sections, the book elucidates associated issues, principles, and highlights notable research. By engaging with this book, readers will gain not only a global perspective on Android malware detection and adversarial methods but also a detailed understanding of the taxonomy and general methods outlined in each part. The publication illustrates both the overarching model and representative academic work, facilitating a profound comprehension of Android malware detection. |
650
|
|
▼aComputer networks▼xSecurity measures. |
650
|
|
▼aData protection. |
650
|
|
▼aData protection▼xLaw and legislation. |
650
|
|
▼aMachine learning. |
650
|
|
▼aBlockchains (Databases). |
650
|
|
▼aMobile and Network Security. |
650
|
|
▼aData and Information Security. |
650
|
|
▼aSecurity Services. |
650
|
|
▼aPrivacy. |
650
|
|
▼aMachine Learning. |
650
|
|
▼aBlockchain. |
700
|
|
▼aZhang, Xiaosong.▼eauthor.▼4aut▼4http://id.loc.gov/vocabulary/relators/aut |
700
|
|
▼aYan, Ran.▼eauthor.▼4aut▼4http://id.loc.gov/vocabulary/relators/aut |
700
|
|
▼aGong, Jiacheng.▼eauthor.▼4aut▼4http://id.loc.gov/vocabulary/relators/aut |
710
|
|
▼aSpringerLink (Online service) |
773
|
|
▼tSpringer Nature eBook |
776
|
|
▼iPrinted edition:▼z9789819714582 |
776
|
|
▼iPrinted edition:▼z9789819714605 |
776
|
|
▼iPrinted edition:▼z9789819714612 |
856
|
|
▼uhttps://doi.org/10.1007/978-981-97-1459-9 |
912
|
|
▼aZDB-2-SCS |
912
|
|
▼aZDB-2-SXCS |
950
|
|
▼aComputer Science (SpringerNature-11645) |
950
|
|
▼aComputer Science (R0) (SpringerNature-43710) |