"Explores the history of Android attacks and covers static and dynamic approaches to analyzing real malware specimens, machine-learning techniques to detect malicious apps, and how to identify banking trojans, ransomware, and SMS fraud"--

Weitere Produkte vom selben Autor

A Machine Learning Based Model of Boko Haram Subrahmanian, V. S., Pulice, Chiara, Brown, James F., Bonen-Clark, Jacob

149,79 €*
Indian Mujahideen Subrahmanian, V. S., Raghavan, R. K., Roul, Animesh, Mannes, Aaron

106,99 €*
A Machine Learning Based Model of Boko Haram Subrahmanian, V. S., Pulice, Chiara, Brown, James F., Bonen-Clark, Jacob

149,79 €*
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba Subrahmanian, V. S., Mannes, Aaron, Dickerson, John P., Shakarian, Jana, Sliva, Amy

90,94 €*