Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/67775
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Han, Bihui | - |
dc.date.accessioned | 2016-05-20T06:14:57Z | - |
dc.date.available | 2016-05-20T06:14:57Z | - |
dc.date.issued | 2016 | - |
dc.identifier.uri | http://hdl.handle.net/10356/67775 | - |
dc.description.abstract | Application clones have been found in many third party markets, which not only make damage to the interest of original application developers, but also pose threats to security and privacy of mobile users. This project implements 3DCFG, which is a centroid-based clone detection method. Experiments on 10,000 Android applications demonstrate the effectiveness and scalability of the 3DCFG method. To further improve the detection speed and accuracy, a combination usage of three library detection tools is used to filter third party libraries before clone detection. A clustering-based library detection method proposed from WuKong is implemented and it is used as a library detection tool in 3DCFG library filtering part. | en_US |
dc.format.extent | 53 p. | en_US |
dc.language.iso | en | en_US |
dc.rights | Nanyang Technological University | - |
dc.subject | DRNTU::Engineering | en_US |
dc.title | Android malware detection using big data analytics techniques | en_US |
dc.type | Final Year Project (FYP) | en_US |
dc.contributor.supervisor | Chen Lihui | en_US |
dc.contributor.school | School of Electrical and Electronic Engineering | en_US |
dc.description.degree | Bachelor of Engineering | en_US |
item.fulltext | With Fulltext | - |
item.grantfulltext | restricted | - |
Appears in Collections: | EEE Student Reports (FYP/IA/PA/PI) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
FYP_Report_Han_Bihui.docx.pdf Restricted Access | 3.53 MB | Adobe PDF | View/Open |
Page view(s)
358
Updated on Mar 28, 2024
Download(s) 50
33
Updated on Mar 28, 2024
Google ScholarTM
Check
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.