Gartner Says Five of Top 10 Worldwide Mobile Phone Vendors Increased Sales in Second Quarter of 2016 ,
Android permissions demystified, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.627-638, 2011. ,
DOI : 10.1145/2046707.2046779
Generating Summary Risk Scores for Mobile Applications, IEEE Transactions on Dependable and Secure Computing, vol.11, issue.3, pp.238-251, 2014. ,
DOI : 10.1109/TDSC.2014.2302293
An Effective Approach to Measuring and Assessing the Risk of Android Application, 2015 International Symposium on Theoretical Aspects of Software Engineering, pp.31-38, 2015. ,
DOI : 10.1109/TASE.2015.16
Risk analysis of Android applications: A user-centric solution, Future Generation Computer Systems, p.2016 ,
DOI : 10.1016/j.future.2016.05.035
Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network, IEEE Transactions on Cybernetics, vol.46, issue.8, 2016. ,
DOI : 10.1109/TCYB.2016.2537649
Quantitative Security Risk Assessment of Android Permissions and Applications, IFIP Annual Conference on Data and Applications Security and Privacy, pp.226-241, 2013. ,
DOI : 10.1007/978-3-642-39256-6_15
URL : https://hal.archives-ouvertes.fr/hal-01490707
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket, Proceedings 2014 Network and Distributed System Security Symposium, 2014. ,
DOI : 10.14722/ndss.2014.23247
Android malware dataset, 2011. ,
Collection of android malware samples ,
Scikit-learn: Machine Learning in Python, Journal of Machine Learning Research, vol.12, pp.2825-2830, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00650905
An Introduction to Statistical Learning: With Applications in R, 2014. ,
DOI : 10.1007/978-1-4614-7138-7