Librarian View
LEADER
03579nam a22005535i 4500
001
17182077
005
20240610162249.0
006
m o d
007
cr nn 008mamaa
008
240523s2024 si | o |||| 0|eng d
020
|a
9789819714599
024
7
|a
10.1007/978-981-97-1459-9
|2
doi
035
|a
(DE-He213)978-981-97-1459-9
050
4
|a
TK5105.59
100
1
|a
Niu, Weina.
|e
author.
|4
aut
|4
http://id.loc.gov/vocabulary/relators/aut
245
1
0
|a
Android Malware Detection and Adversarial Methods
|h
[electronic resource] /
|c
by Weina Niu, Xiaosong Zhang, Ran Yan, Jiacheng Gong.
250
|a
1st ed. 2024.
264
1
|a
Singapore :
|b
Springer Nature Singapore :
|b
Imprint: Springer,
|c
2024.
300
|a
1 online resource (XIV, 190 p.) 5 illus.
336
|a
text
|b
txt
|2
rdacontent
337
|a
computer
|b
c
|2
rdamedia
338
|a
online resource
|b
cr
|2
rdacarrier
347
|a
text file
|b
PDF
|2
rda
506
|a
Access restricted by licensing agreement.
520
|a
The rise of Android malware poses a significant threat to users' information security and privacy. Malicious software can inflict severe harm on users by employing various tactics, including deception, personal information theft, and device control. To address this issue, both academia and industry are continually engaged in research and development efforts focused on detecting and countering Android malware. This book is a comprehensive academic monograph crafted against this backdrop. The publication meticulously explores the background, methods, adversarial approaches, and future trends related to Android malware. It is organized into four parts: the overview of Android malware detection, the general Android malware detection method, the adversarial method for Android malware detection, and the future trends of Android malware detection. Within these sections, the book elucidates associated issues, principles, and highlights notable research. By engaging with this book, readers will gain not only a global perspective on Android malware detection and adversarial methods but also a detailed understanding of the taxonomy and general methods outlined in each part. The publication illustrates both the overarching model and representative academic work, facilitating a profound comprehension of Android malware detection.
590
|a
Access is available to the Yale community.
650
0
|a
Computer networks
|x
Security measures.
650
0
|a
Data protection.
650
0
|a
Data protection
|x
Law and legislation.
650
0
|a
Machine learning.
650
0
|a
Blockchains (Databases).
700
1
|a
Zhang, Xiaosong.
|e
author.
|4
aut
|4
http://id.loc.gov/vocabulary/relators/aut
700
1
|a
Yan, Ran.
|e
author.
|4
aut
|4
http://id.loc.gov/vocabulary/relators/aut
700
1
|a
Gong, Jiacheng.
|e
author.
|4
aut
|4
http://id.loc.gov/vocabulary/relators/aut
710
2
|a
SpringerLink (Online service)
730
0
|a
Springer ENIN.
773
0
|t
Springer Nature eBook
776
0
8
|i
Printed edition:
|z
9789819714582
776
0
8
|i
Printed edition:
|z
9789819714605
776
0
8
|i
Printed edition:
|z
9789819714612
852
8
0
|b
yulintx
|h
None
|z
Online resource
852
8
0
|z
Online resource
856
4
0
|y
Online book
|u
https://yale.idm.oclc.org/login?URL=https://doi.org/10.1007/978-981-97-1459-9
901
|a
TK5105.59
902
|a
Yale Internet Resource
|b
Yale Internet Resource >> None|DELIM|17057388
905
|a
online resource
907
|a
2024-06-10T16:22:49.000Z
946
|a
DO NOT EDIT. DO NOT EXPORT.
953
|a
https://doi.org/10.1007/978-981-97-1459-9