Librarian View

LEADER 03579nam a22005535i 4500
001 17182077
005 20240610162249.0
006 m o d
007 cr nn 008mamaa
008 240523s2024 si | o |||| 0|eng d
020
  
  
|a 9789819714599
024
7
  
|a 10.1007/978-981-97-1459-9 |2 doi
035
  
  
|a (DE-He213)978-981-97-1459-9
050
  
4
|a TK5105.59
100
1
  
|a Niu, Weina. |e author. |4 aut |4 http://id.loc.gov/vocabulary/relators/aut
245
1
0
|a Android Malware Detection and Adversarial Methods |h [electronic resource] / |c by Weina Niu, Xiaosong Zhang, Ran Yan, Jiacheng Gong.
250
  
  
|a 1st ed. 2024.
264
  
1
|a Singapore : |b Springer Nature Singapore : |b Imprint: Springer, |c 2024.
300
  
  
|a 1 online resource (XIV, 190 p.) 5 illus.
336
  
  
|a text |b txt |2 rdacontent
337
  
  
|a computer |b c |2 rdamedia
338
  
  
|a online resource |b cr |2 rdacarrier
347
  
  
|a text file |b PDF |2 rda
506
  
  
|a Access restricted by licensing agreement.
520
  
  
|a The rise of Android malware poses a significant threat to users' information security and privacy. Malicious software can inflict severe harm on users by employing various tactics, including deception, personal information theft, and device control. To address this issue, both academia and industry are continually engaged in research and development efforts focused on detecting and countering Android malware. This book is a comprehensive academic monograph crafted against this backdrop. The publication meticulously explores the background, methods, adversarial approaches, and future trends related to Android malware. It is organized into four parts: the overview of Android malware detection, the general Android malware detection method, the adversarial method for Android malware detection, and the future trends of Android malware detection. Within these sections, the book elucidates associated issues, principles, and highlights notable research. By engaging with this book, readers will gain not only a global perspective on Android malware detection and adversarial methods but also a detailed understanding of the taxonomy and general methods outlined in each part. The publication illustrates both the overarching model and representative academic work, facilitating a profound comprehension of Android malware detection.
590
  
  
|a Access is available to the Yale community.
650
  
0
|a Computer networks |x Security measures.
650
  
0
|a Data protection.
650
  
0
|a Data protection |x Law and legislation.
650
  
0
|a Machine learning.
650
  
0
|a Blockchains (Databases).
700
1
  
|a Zhang, Xiaosong. |e author. |4 aut |4 http://id.loc.gov/vocabulary/relators/aut
700
1
  
|a Yan, Ran. |e author. |4 aut |4 http://id.loc.gov/vocabulary/relators/aut
700
1
  
|a Gong, Jiacheng. |e author. |4 aut |4 http://id.loc.gov/vocabulary/relators/aut
710
2
  
|a SpringerLink (Online service)
730
0
  
|a Springer ENIN.
773
0
  
|t Springer Nature eBook
776
0
8
|i Printed edition: |z 9789819714582
776
0
8
|i Printed edition: |z 9789819714605
776
0
8
|i Printed edition: |z 9789819714612
852
8
0
|b yulintx |h None |z Online resource
852
8
0
|z Online resource
856
4
0
|y Online book |u https://yale.idm.oclc.org/login?URL=https://doi.org/10.1007/978-981-97-1459-9
901
  
  
|a TK5105.59
902
  
  
|a Yale Internet Resource |b Yale Internet Resource >> None|DELIM|17057388
905
  
  
|a online resource
907
  
  
|a 2024-06-10T16:22:49.000Z
946
  
  
|a DO NOT EDIT. DO NOT EXPORT.
953
  
  
|a https://doi.org/10.1007/978-981-97-1459-9
Timestamp: 2024-08-28T11:32:42.333Z

Author Authorities

Variants from 2414943 (matched with [SpringerLink (Online service)])

Springer-Verlag. SpringerLink
LINK (Online service)
Timestamp: 2024-08-26T15:57:28.457Z

Subject Authorities

Variants from 941585 (matched with [Computer networks])

Communication systems, Computer
Computer communication systems
Data networks, Computer
ECNs (Electronic communication networks)
Electronic communication networks
Networks, Computer
Teleprocessing networks
Timestamp: 2024-08-26T15:49:03.531Z

Variants from 944608 (matched with [Data protection])

Data governance
Data regulation
Personal data protection
Protection, Data
Timestamp: 2024-08-26T15:49:04.367Z

Variants from 968075 (matched with [Machine learning])

Learning, Machine
Timestamp: 2024-08-26T15:49:11.214Z

Variants from 3534449 (matched with [Blockchains (Databases)])

Block chains (Databases)
Timestamp: 2024-08-26T16:03:38.129Z