"Explores the history of Android attacks and covers static and dynamic approaches to analyzing real malware specimens, machine-learning techniques to detect malicious apps, and how to identify banking trojans, ransomware, and SMS fraud"--

Weitere Produkte vom selben Autor

Geospatial Abduction Subrahmanian, V. S., Shakarian, Paulo

53,49 €*
A Machine Learning Based Model of Boko Haram Subrahmanian, V. S., Pulice, Chiara, Brown, James F., Bonen-Clark, Jacob

149,79 €*
The Global Cyber-Vulnerability Report Subrahmanian, V. S., Prakash, Aditya, Dumitras, Tudor, Ovelgonne, Michael

106,99 €*
The Global Cyber-Vulnerability Report Subrahmanian, V. S., Prakash, Aditya, Dumitras, Tudor, Ovelgonne, Michael

106,99 €*