Synonyms
Glossary
- Antivirus signatures:
-
Singularity used by antivirus engines to identify certain piece of malware.
- BlackASO:
-
Black Hat App Store Optimization. It refers to any technique used to artificially rise up the number of downloads and rating of applications in markets.
- GMT:
-
Greenwich mean time.
- PHP:
-
Pre-hypertext processor.
- Malware:
-
Code written to cause harm to the device where it runs or, indirectly, the person using the device.
Definition
Machine learning is concerned with how to construct computer programs that automatically learn with experience. Machine learning systems are based on the establishment of an explicit or implicit model that allows to categorize the analyzed patterns (Tsai et al. 2009).
This automation capability is very useful in the cyberspace, where big amounts of data need to be handled. In regard to that, the term Big Data is frequently used. Big Data usually includes datasets with sizes...
This is a preview of subscription content, log in via an institution.
References
Chiang B, Technode (2012) Shuabang: the great evil in China. In: Business insider. Available via DIALOG. http://www.businessinsider.com/shuabang-the-great-evil-in-china-2012-11. Accessed 9 May 2016
De los Santos S, García MA (2015) Detected some “clickers” in Google Play simulating apps and games. In: Eleven Paths Blog. Available via DIALOG. https://securelist.com/analysis/kaspersky-security-bulletin/73839/mobile-malware-evolution-2015/. Accessed 9 May 2016
De Mauro A, Greco M, Grimaldi M (2016) A formal definition of big data based on its essential features. Libr Rev 65:122135. doi:10.1108/LR-06-2015-0061
Laney D (2001) 3D data management: controlling data volume, velocity and variety. In: Gartner. Available via DIALOG. https://blogs.gartner.com/doug-laney/files/2012/01/ad949-3D-Data-Management-Controlling-Data-Volume-Velocity-and-Variety.pdf. Accessed 14 July 2016
Pettey C, Goasduff L (2011) Gartner says solving ‘big data’ challenge involves more than just managing volumes of data. In: Gartner. Available via DIALOG. http://www.gartner.com/newsroom/id/1731916. Accessed 14 July 2016
Širmer J (2015) Fobus, the sneaky little thief that could. In: Avast blog. Available via DIALOG. https://blog.avast.com/2015/01/15/fobus-the-sneaky-little-thief-that-could/. Accessed 9 May 2016
Tsai CF, Hsu YF, Lin CY, Lin WY (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36(10):11994–12000
University Alliance (2016) What is big data? In: Villanova University web page. Available via DIALOG. http://www.villanovau.com/resources/bi/what-is-big-data/#.V4die6KaJuI. Accessed 14 July 2016
Unuchek R, Chebyshev V (2015) Mobile malware evolution 2015. In: Securelist, Kaspersky Security Bulletin. Available via DIALOG. https://securelist.com/analysis/kaspersky-security-bulletin/73839/mobile-malware-evolution-2015/. Accessed 9 May 2016
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2017 Springer Science+Business Media LLC
About this entry
Cite this entry
de los Santos, S., Guzmán, A., Torrano, C. (2017). Android Malware Pattern Recognition for Fraud Detection and Attribution: A Case Study. In: Alhajj, R., Rokne, J. (eds) Encyclopedia of Social Network Analysis and Mining. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7163-9_110173-1
Download citation
DOI: https://doi.org/10.1007/978-1-4614-7163-9_110173-1
Received:
Accepted:
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-7163-9
Online ISBN: 978-1-4614-7163-9
eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering