A Forensic Analysis of Android Malware - How is Malware Written and How it Could Be Detected?. Allix, K., Jérome, Q., Bissyandé, T. F., Klein, J., State, R., & Le Traon, Y. In Proceedings of Computer Software and Applications Conference (COMPSAC), pages 384-393, 2014. Paper bibtex @inproceedings{ dblp1672160,
title = {A Forensic Analysis of Android Malware - How is Malware Written and How it Could Be Detected?},
author = {Kevin Allix and Quentin Jérome and Tegawendé F. Bissyandé and Jacques Klein and Radu State and Yves Le Traon},
author_short = {Allix, K. and Jérome, Q. and Bissyandé, T. F. and Klein, J. and State, R. and Le Traon, Y.},
bibtype = {inproceedings},
type = {inproceedings},
year = {2014},
key = {dblp1672160},
id = {dblp1672160},
biburl = {http://www.dblp.org/rec/bibtex/conf/compsac/AllixJBKST14},
url = {http://dx.doi.org/10.1109/COMPSAC.2014.61},
conference = {COMPSAC},
pages = {384-393},
text = {COMPSAC 2014:384-393},
booktitle = {Proceedings of Computer Software and Applications Conference (COMPSAC)}
}
Downloads: 0
{"_id":"wKia6xH7XMmZ8fA7W","bibbaseid":"allix-jrome-bissyand-klein-state-letraon-aforensicanalysisofandroidmalwarehowismalwarewrittenandhowitcouldbedetected-2014","downloads":0,"creationDate":"2015-07-23T10:26:16.593Z","title":"A Forensic Analysis of Android Malware - How is Malware Written and How it Could Be Detected?","author_short":["Allix, K.","Jérome, Q.","Bissyandé, T. F.","Klein, J.","State, R.","Le Traon, Y."],"year":2014,"bibtype":"inproceedings","biburl":"http://www.dblp.org/rec/bibtex/conf/compsac/AllixJBKST14","bibdata":{"title":"A Forensic Analysis of Android Malware - How is Malware Written and How it Could Be Detected?","author":["Kevin Allix","Quentin Jérome","Tegawendé F. Bissyandé","Jacques Klein","Radu State","Yves Le Traon"],"author_short":["Allix, K.","Jérome, Q.","Bissyandé, T. F.","Klein, J.","State, R.","Le Traon, Y."],"bibtype":"inproceedings","type":"inproceedings","year":"2014","key":"dblp1672160","id":"dblp1672160","biburl":"http://www.dblp.org/rec/bibtex/conf/compsac/AllixJBKST14","url":"http://dx.doi.org/10.1109/COMPSAC.2014.61","conference":"COMPSAC","pages":"384-393","text":"COMPSAC 2014:384-393","booktitle":"Proceedings of Computer Software and Applications Conference (COMPSAC)","bibtex":"@inproceedings{ dblp1672160,\n title = {A Forensic Analysis of Android Malware - How is Malware Written and How it Could Be Detected?},\n author = {Kevin Allix and Quentin Jérome and Tegawendé F. Bissyandé and Jacques Klein and Radu State and Yves Le Traon},\n author_short = {Allix, K. and Jérome, Q. and Bissyandé, T. F. and Klein, J. and State, R. and Le Traon, Y.},\n bibtype = {inproceedings},\n type = {inproceedings},\n year = {2014},\n key = {dblp1672160},\n id = {dblp1672160},\n biburl = {http://www.dblp.org/rec/bibtex/conf/compsac/AllixJBKST14},\n url = {http://dx.doi.org/10.1109/COMPSAC.2014.61},\n conference = {COMPSAC},\n pages = {384-393},\n text = {COMPSAC 2014:384-393},\n booktitle = {Proceedings of Computer Software and Applications Conference (COMPSAC)}\n}","bibbaseid":"allix-jrome-bissyand-klein-state-letraon-aforensicanalysisofandroidmalwarehowismalwarewrittenandhowitcouldbedetected-2014","role":"author","urls":{"Paper":"http://dx.doi.org/10.1109/COMPSAC.2014.61"},"downloads":0},"search_terms":["forensic","analysis","android","malware","malware","written","detected","allix","jérome","bissyandé","klein","state","le traon"],"keywords":[],"authorIDs":[],"dataSources":["FggtfgEfwoQ2JGw4w"]}