Book chapter 1331 views 305 downloads
Detecting Malicious Collusion Between Mobile Software Applications: The Android TM Case
Irina Măriuca Asăvoae,
Jorge Blasco,
Thomas M. Chen,
Harsha Kumara Kalutarage,
Igor Muttik,
Hoang Nga Nguyen,
Markus Roggenbach ,
Siraj Ahmed Shaikh
Data Analytics and Decision Support for Cybersecurity
Swansea University Author: Markus Roggenbach
-
PDF | Author's Original
Download (1.02MB)
DOI (Published version): 10.1007/978-3-319-59439-2_3
Abstract
Detecting Malicious Collusion Between Mobile Software Applications: The Android TM Case
Published in: | Data Analytics and Decision Support for Cybersecurity |
---|---|
ISBN: | 978-3-319-59438-5 978-3-319-59439-2 |
ISSN: | 2520-1859 2520-1867 |
Published: |
Springer
2017
|
Online Access: |
Check full text
|
URI: | https://cronfa.swan.ac.uk/Record/cronfa34902 |
first_indexed |
2017-09-18T18:58:58Z |
---|---|
last_indexed |
2018-09-06T18:41:42Z |
id |
cronfa34902 |
recordtype |
SURis |
fullrecord |
<?xml version="1.0"?><rfc1807><datestamp>2018-09-06T13:35:17.4725264</datestamp><bib-version>v2</bib-version><id>34902</id><entry>2017-08-11</entry><title>Detecting Malicious Collusion Between Mobile Software Applications: The Android TM Case</title><swanseaauthors><author><sid>7733869ae501442da6926fac77cd155b</sid><ORCID>0000-0002-3819-2787</ORCID><firstname>Markus</firstname><surname>Roggenbach</surname><name>Markus Roggenbach</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2017-08-11</date><deptcode>MACS</deptcode><abstract/><type>Book chapter</type><journal>Data Analytics and Decision Support for Cybersecurity</journal><paginationEnd>97</paginationEnd><publisher>Springer</publisher><isbnPrint>978-3-319-59438-5</isbnPrint><isbnElectronic>978-3-319-59439-2</isbnElectronic><issnPrint>2520-1859</issnPrint><issnElectronic>2520-1867</issnElectronic><keywords/><publishedDay>31</publishedDay><publishedMonth>12</publishedMonth><publishedYear>2017</publishedYear><publishedDate>2017-12-31</publishedDate><doi>10.1007/978-3-319-59439-2_3</doi><url/><notes/><college>COLLEGE NANME</college><department>Mathematics and Computer Science School</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>MACS</DepartmentCode><institution>Swansea University</institution><apcterm/><lastEdited>2018-09-06T13:35:17.4725264</lastEdited><Created>2017-08-11T15:19:15.3255497</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Mathematics and Computer Science - Computer Science</level></path><authors><author><firstname>Irina Măriuca</firstname><surname>Asăvoae</surname><order>1</order></author><author><firstname>Jorge</firstname><surname>Blasco</surname><order>2</order></author><author><firstname>Thomas M.</firstname><surname>Chen</surname><order>3</order></author><author><firstname>Harsha Kumara</firstname><surname>Kalutarage</surname><order>4</order></author><author><firstname>Igor</firstname><surname>Muttik</surname><order>5</order></author><author><firstname>Hoang Nga</firstname><surname>Nguyen</surname><order>6</order></author><author><firstname>Markus</firstname><surname>Roggenbach</surname><orcid>0000-0002-3819-2787</orcid><order>7</order></author><author><firstname>Siraj Ahmed</firstname><surname>Shaikh</surname><order>8</order></author></authors><documents><document><filename>0034902-11082017152304.pdf</filename><originalFilename>main.pdf</originalFilename><uploaded>2017-08-11T15:23:04.7900000</uploaded><type>Output</type><contentLength>972888</contentLength><contentType>application/pdf</contentType><version>Author's Original</version><cronfaStatus>true</cronfaStatus><embargoDate>2019-08-02T00:00:00.0000000</embargoDate><copyrightCorrect>true</copyrightCorrect><language>eng</language></document></documents><OutputDurs/></rfc1807> |
spelling |
2018-09-06T13:35:17.4725264 v2 34902 2017-08-11 Detecting Malicious Collusion Between Mobile Software Applications: The Android TM Case 7733869ae501442da6926fac77cd155b 0000-0002-3819-2787 Markus Roggenbach Markus Roggenbach true false 2017-08-11 MACS Book chapter Data Analytics and Decision Support for Cybersecurity 97 Springer 978-3-319-59438-5 978-3-319-59439-2 2520-1859 2520-1867 31 12 2017 2017-12-31 10.1007/978-3-319-59439-2_3 COLLEGE NANME Mathematics and Computer Science School COLLEGE CODE MACS Swansea University 2018-09-06T13:35:17.4725264 2017-08-11T15:19:15.3255497 Faculty of Science and Engineering School of Mathematics and Computer Science - Computer Science Irina Măriuca Asăvoae 1 Jorge Blasco 2 Thomas M. Chen 3 Harsha Kumara Kalutarage 4 Igor Muttik 5 Hoang Nga Nguyen 6 Markus Roggenbach 0000-0002-3819-2787 7 Siraj Ahmed Shaikh 8 0034902-11082017152304.pdf main.pdf 2017-08-11T15:23:04.7900000 Output 972888 application/pdf Author's Original true 2019-08-02T00:00:00.0000000 true eng |
title |
Detecting Malicious Collusion Between Mobile Software Applications: The Android TM Case |
spellingShingle |
Detecting Malicious Collusion Between Mobile Software Applications: The Android TM Case Markus Roggenbach |
title_short |
Detecting Malicious Collusion Between Mobile Software Applications: The Android TM Case |
title_full |
Detecting Malicious Collusion Between Mobile Software Applications: The Android TM Case |
title_fullStr |
Detecting Malicious Collusion Between Mobile Software Applications: The Android TM Case |
title_full_unstemmed |
Detecting Malicious Collusion Between Mobile Software Applications: The Android TM Case |
title_sort |
Detecting Malicious Collusion Between Mobile Software Applications: The Android TM Case |
author_id_str_mv |
7733869ae501442da6926fac77cd155b |
author_id_fullname_str_mv |
7733869ae501442da6926fac77cd155b_***_Markus Roggenbach |
author |
Markus Roggenbach |
author2 |
Irina Măriuca Asăvoae Jorge Blasco Thomas M. Chen Harsha Kumara Kalutarage Igor Muttik Hoang Nga Nguyen Markus Roggenbach Siraj Ahmed Shaikh |
format |
Book chapter |
container_title |
Data Analytics and Decision Support for Cybersecurity |
publishDate |
2017 |
institution |
Swansea University |
isbn |
978-3-319-59438-5 978-3-319-59439-2 |
issn |
2520-1859 2520-1867 |
doi_str_mv |
10.1007/978-3-319-59439-2_3 |
publisher |
Springer |
college_str |
Faculty of Science and Engineering |
hierarchytype |
|
hierarchy_top_id |
facultyofscienceandengineering |
hierarchy_top_title |
Faculty of Science and Engineering |
hierarchy_parent_id |
facultyofscienceandengineering |
hierarchy_parent_title |
Faculty of Science and Engineering |
department_str |
School of Mathematics and Computer Science - Computer Science{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Mathematics and Computer Science - Computer Science |
document_store_str |
1 |
active_str |
0 |
published_date |
2017-12-31T19:09:31Z |
_version_ |
1822520897881243648 |
score |
11.048756 |