Research on malicious behavior detection based on iOS system

Firstly,the cases of malicious application of multiple iOS platforms were enumerated.The main malicious behavior of mobile application under iOS platform was analyzed by dissecting the misuse of crime and the bad influence.The key technologies of malicious behavior detection process were studied.The...

Full description

Saved in:
Bibliographic Details
Main Authors: Yuliang WANG, Xiaodong CHEN, Tun WU
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2017-02-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2017047/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530033868374016
author Yuliang WANG
Xiaodong CHEN
Tun WU
author_facet Yuliang WANG
Xiaodong CHEN
Tun WU
author_sort Yuliang WANG
collection DOAJ
description Firstly,the cases of malicious application of multiple iOS platforms were enumerated.The main malicious behavior of mobile application under iOS platform was analyzed by dissecting the misuse of crime and the bad influence.The key technologies of malicious behavior detection process were studied.The iOS application malicious behavior detection model was put forward.Finally,iOS application malicious behavior detection solution was given.
format Article
id doaj-art-2bcdd664861a4a98b8fa34402cb8da01
institution Kabale University
issn 1000-0801
language zho
publishDate 2017-02-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-2bcdd664861a4a98b8fa34402cb8da012025-01-15T03:13:18ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012017-02-0133485459603369Research on malicious behavior detection based on iOS systemYuliang WANGXiaodong CHENTun WUFirstly,the cases of malicious application of multiple iOS platforms were enumerated.The main malicious behavior of mobile application under iOS platform was analyzed by dissecting the misuse of crime and the bad influence.The key technologies of malicious behavior detection process were studied.The iOS application malicious behavior detection model was put forward.Finally,iOS application malicious behavior detection solution was given.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2017047/iOSmalicious behavioriOS application safety
spellingShingle Yuliang WANG
Xiaodong CHEN
Tun WU
Research on malicious behavior detection based on iOS system
Dianxin kexue
iOS
malicious behavior
iOS application safety
title Research on malicious behavior detection based on iOS system
title_full Research on malicious behavior detection based on iOS system
title_fullStr Research on malicious behavior detection based on iOS system
title_full_unstemmed Research on malicious behavior detection based on iOS system
title_short Research on malicious behavior detection based on iOS system
title_sort research on malicious behavior detection based on ios system
topic iOS
malicious behavior
iOS application safety
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2017047/
work_keys_str_mv AT yuliangwang researchonmaliciousbehaviordetectionbasedoniossystem
AT xiaodongchen researchonmaliciousbehaviordetectionbasedoniossystem
AT tunwu researchonmaliciousbehaviordetectionbasedoniossystem