Evaluating Op-Code Frequency Histograms in Malware and Third-Party Mobile Applications. Canfora, G., Mercaldo, F., & Visaggio, C. A. In Obaidat, M. S. & Lorenz, P., editors, E-Business and Telecommunications - 12th International Joint Conference, ICETE 2015, Colmar, France, July 20-22, 2015, Revised Selected Papers, volume 585, of Communications in Computer and Information Science, pages 201–222, 2015. Springer. Paper doi bibtex @inproceedings{DBLP:conf/icete/CanforaMV15,
author = {Gerardo Canfora and
Francesco Mercaldo and
Corrado Aaron Visaggio},
editor = {Mohammad S. Obaidat and
Pascal Lorenz},
title = {Evaluating Op-Code Frequency Histograms in Malware and Third-Party
Mobile Applications},
booktitle = {E-Business and Telecommunications - 12th International Joint Conference,
{ICETE} 2015, Colmar, France, July 20-22, 2015, Revised Selected Papers},
series = {Communications in Computer and Information Science},
volume = {585},
pages = {201--222},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-319-30222-5\_10},
doi = {10.1007/978-3-319-30222-5\_10},
timestamp = {Tue, 21 Mar 2023 21:02:06 +0100},
biburl = {https://dblp.org/rec/conf/icete/CanforaMV15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"3TWKLNHD7HkjddnbJ","bibbaseid":"canfora-mercaldo-visaggio-evaluatingopcodefrequencyhistogramsinmalwareandthirdpartymobileapplications-2015","author_short":["Canfora, G.","Mercaldo, F.","Visaggio, C. A."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Gerardo"],"propositions":[],"lastnames":["Canfora"],"suffixes":[]},{"firstnames":["Francesco"],"propositions":[],"lastnames":["Mercaldo"],"suffixes":[]},{"firstnames":["Corrado","Aaron"],"propositions":[],"lastnames":["Visaggio"],"suffixes":[]}],"editor":[{"firstnames":["Mohammad","S."],"propositions":[],"lastnames":["Obaidat"],"suffixes":[]},{"firstnames":["Pascal"],"propositions":[],"lastnames":["Lorenz"],"suffixes":[]}],"title":"Evaluating Op-Code Frequency Histograms in Malware and Third-Party Mobile Applications","booktitle":"E-Business and Telecommunications - 12th International Joint Conference, ICETE 2015, Colmar, France, July 20-22, 2015, Revised Selected Papers","series":"Communications in Computer and Information Science","volume":"585","pages":"201–222","publisher":"Springer","year":"2015","url":"https://doi.org/10.1007/978-3-319-30222-5\\_10","doi":"10.1007/978-3-319-30222-5_10","timestamp":"Tue, 21 Mar 2023 21:02:06 +0100","biburl":"https://dblp.org/rec/conf/icete/CanforaMV15.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/icete/CanforaMV15,\n author = {Gerardo Canfora and\n Francesco Mercaldo and\n Corrado Aaron Visaggio},\n editor = {Mohammad S. Obaidat and\n Pascal Lorenz},\n title = {Evaluating Op-Code Frequency Histograms in Malware and Third-Party\n Mobile Applications},\n booktitle = {E-Business and Telecommunications - 12th International Joint Conference,\n {ICETE} 2015, Colmar, France, July 20-22, 2015, Revised Selected Papers},\n series = {Communications in Computer and Information Science},\n volume = {585},\n pages = {201--222},\n publisher = {Springer},\n year = {2015},\n url = {https://doi.org/10.1007/978-3-319-30222-5\\_10},\n doi = {10.1007/978-3-319-30222-5\\_10},\n timestamp = {Tue, 21 Mar 2023 21:02:06 +0100},\n biburl = {https://dblp.org/rec/conf/icete/CanforaMV15.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Canfora, G.","Mercaldo, F.","Visaggio, C. A."],"editor_short":["Obaidat, M. S.","Lorenz, P."],"key":"DBLP:conf/icete/CanforaMV15","id":"DBLP:conf/icete/CanforaMV15","bibbaseid":"canfora-mercaldo-visaggio-evaluatingopcodefrequencyhistogramsinmalwareandthirdpartymobileapplications-2015","role":"author","urls":{"Paper":"https://doi.org/10.1007/978-3-319-30222-5\\_10"},"metadata":{"authorlinks":{}},"html":""},"bibtype":"inproceedings","biburl":"https://bibbase.org/network/files/ZMoBRAsPdjJiKKMw9","dataSources":["tkYZHktxQK36HGz4m","zEQY6Hega8p9e29Ma","iddbzEfGmqi6GhzyH","joZ9xoHDu34eb2XBK"],"keywords":[],"search_terms":["evaluating","code","frequency","histograms","malware","third","party","mobile","applications","canfora","mercaldo","visaggio"],"title":"Evaluating Op-Code Frequency Histograms in Malware and Third-Party Mobile Applications","year":2015}