@incollection{, E61481956131C34133D0436C1D4F587A , author={{WaziriO.V.} and {J.Aba} and {AbdullahiM.B} and {UmeU.A} and {AdewaleO.S} and {University of Technology Minna}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}15518 } @incollection{b0, , title={{20:36:47,com.facebook.fbservice.service}} 07.10.2015 21:13:10 , booktitle={{before,com.mediatek.filemanager.service.FileManagerService}} , booktitle={{com.facebook.conditionalworker}} Torch,0,0,0,0,1 , year={Facebook,0,0,0,0,1,? before,Messages,0,0,0,0,1. CellConnService.PhoneStatesMgrService,0,0,0,0,1. 0,0,0,0,1. ,0,0,0,0,1. ,0,0,0,0,1. LaunchService,0,0,0,0,1. ,0,0,0,0,1. BackgroudCheckService,0,0,0,0,1. 2015. DefaultBlueService,0,0,0,0,1. 2015. ConditionalWorkerService,0,0,0,0,1. 2015. VaultManagerService,0,0,0,0,1. 2015. AnalyticsService,0,0,0,0,1. 2015. DefaultBlueService,0,0,0,0,1. ConditionalWorkerService,0,0,0,0,1. ConditionalWorkerService,0,0,0,0,1. Launcher,0,0,0,0,1. YouTube,0,0,0,0,1. Launcher,0,0,0,0,1. Google Play Store,0,0,0,0,1. Launcher,0,0,0,0,1. Gallery,0,0,0,0,1. Launcher,0,0,0,0,1. Launcher,0,0,0,0,1. Contacts,0,0,0,0,1. 1,0,0,0,1. Phone,0,0,0,0,1. 2015 20:49:27,Contacts,0,0,0,0,1. Launcher,0,0,0,0,1. Email,0,0,0,0,1. Launcher,0,0,0,0,1. SendSMS,0,0,0,0,1. 2015 20:51:20,?,0,0,0,1,0. ConditionalWorkerService,0,0,0,0,1. ConditionalWorkerService,0,0,0,0,1. 0,1,0,0,1. Phone,0,0,0,0,1. ConditionalWorkerService,0,0,0,0,1. Launcher,0,0,0,0,1. ConditionalWorkerService,0,0,0,0,1. WhatsApp,0,0,0,0,1. Tecno Input,0,0,0,0,1} 20 , note={com.facebook.conditionalworker. com.facebook.conditionalworker.ConditionalWorkerService,0,0,0,0,1. com.facebook.conditionalworker.ConditionalWorkerService,0,0,0,0,1. WhatsApp,0,0,0,0,1,? 07.10.2015 21:16:12,Launcher,0,0,0,0,1,? 07.10.2015 21:16:28,SendSMS,0,0,0,0,1,? 07.10.2015 21:16:53,Launcher,0,0,0,0,1,? 07.10.2015 21:16:59,Device Monitoring,0,0,0,0,1,? References Références Referencias} } @incollection{b1, , title={{An Automated Malware Detection System for Android using Behavior-based Analysis AMDA}} , author={{ AbelaKevin } and { JoshuaAngelesl } and { DonKristopher } and { EDelas Alas } and { JanRaynier } and { PTolentino } and { RobertJoseph } and { MiguelGomez } and { NAlberto }} , journal={{International Journal of Cyber-Security and Digital Forensics}} 2 2 , year={2013} , publisher={The Society of Digital Information and Wireless Communications} , note={IJCSDF)} } @incollection{b2, , title={{Detection of Malicious Android Mobile Applications Based on Aggregated System Call Events}} , author={{ JoungYou } and { Hyung-WooHam } and { Lee }} , journal={{International Journal of Computer and Communication Engineering}} 3 2 , year={2014. March 2014} } @incollection{b3, , title={{Vulnerability monitoring mechanism in Android based smartphone with correlation analysis on event-driven activities}} , author={{ YJHam } and { WBChoi } and { HWLee } and { JDLim } and { JNKim }} , booktitle={{nd International through Manifest and API Calls Tracing, 7 th Asia Joint Conference on Information Security}} , year={2012. 2012 2} } @incollection{b4, , title={{Android Malware Detection via a Latent Network Behaviour Analysis}} , author={{ TEWei } and { CHMao } and { ABJeng } and { HMLee } and { HTWang } and { DJWu }} , booktitle={{IEEE 11 th International Conference on Trust, Security and Privacy in Computing and Communications}} , year={2012} } @incollection{b5, , title={{Crowdroid: behavior-based malware detection system for Android}} , author={{ IBurquera } and { UZurutuza } and { SNadjm-Tehrani }} , booktitle={{Proceedings of the 1 st ACM workshop on Security and privacy in smartphones and mobile devices}} the 1 st ACM workshop on Security and privacy in smartphones and mobile devices , year={2011} } @incollection{b6, , title={{Android Mobile Application System Call Event Pattern Analysis for Determination of Malicious Attack}} , author={{ You JoungHam } and { DaeyeolMoon } and { Hyung-WooLee } and { JaeDeokLim } and { Jeong NyeoKim }} 10.14257/ijsia.2014.8.1.22 , journal={{International Journal of Security and Its Applications}} 8 1 , year={2014} } @book{b7, , title={{Google Play Matches Apple's iOS With 700,000 Apps. Businessweek}} , author={{ IslamZack }} , year={2012. 30 October 2012} } @incollection{b8, , title={{MADAM: A Multi-level Anomaly Detector for Android Malware}} , author={{ GDini } and { FMartinelli } and { ASaracino } and { ASgandurra }} , journal={{Computer Network Security}} 7531 , year={2012} } @book{b9, , title={{}} , author={{ WenliangYousraaafer } and { HengDu } and { Yin }} , year={2013} } @book{b10, , title={{Mining API-Level Features for Robust Malware Detection in Android}} , author={{ DroidApiminer }} } @book{b11, , title={{Runtime-based Behaviour Dynamic Analysis System for Android Malware Detection}} , author={{ LuoxuMin } and { QinghuaCao }} , year={2013} } @book{b12, , title={{Identifying Android Malicious Repackaged Applications by Threadgrained System call Sequences}} , author={{ Ying-DarLin } and { Yuan-ChengLai } and { Chien-HungChen } and { Hao-ChuanTsai }} 10.1016/j.cose.2013.08.010 , year={2013. 2013} , publisher={Elsevier:Computers & Security} } @book{b13, , author={{ LoviDua } and { DivyaBansal }} , title={{Taxonomy: Mobile MalwareThreats and Detection Techniques}} , year={2014} } @book{b14, , title={{}} , author={{ Acity } and { Wimon } and { AiaaCsia } and { Dppr } and { InNeco } and { Wes }} , editor={Dhinaharan Nagamalai et al.} , year={2014} } @book{b15, , title={{An Analysis of Mobile Malware and Detection Techniques}} , author={{ AswathyDinesh }} , year={2013} } @incollection{b16, , title={{System Calls Analysis of Malwares on Android}} , author={{ FTchakounté } and { PDayang }} , journal={{International Journal of Science and Technology}} 2 9 , year={2013} } @incollection{b17, , title={{Automatic Feature Extraction, Categorization and Detection of Malicious Code in Android Applications}} , author={{ MuhammadZuhairqadir } and { AtifnisarJilani } and { Hassam UllahSheikh }} , journal={{International Journal of Information & Network Security (IJINS)}} 3 1 , year={2014. February 2014} } @book{b18, , title={{Mobile Malware Evolution, Detection and Defense. Unpublished Term Survey Paper, Institute for Computing, Information and Cognitive Systems}} , author={{ RSrikanth }} , year={2012} , address={Vancouver, Canada} University of British Columbia }