[1] Guojun Peng, Jingwen Li, Runkang Sun and Yunchang Xiao, Android
malware detection research and development, J. Wuhan Univ. (Nat. Sci.
Ed.) (2015), 21-33.
[2] X. Jiang and Y. Zhou, Dissecting android malware characterization
and evolution, IEEE Symposium on Symposium Security & Privacy, IEEE
(2012), 95-109.
[3] A. Arora, S. Garg and S. K. Peddoju, Malware detection using
network traffic analysis in android based mobile devices, Eighth
International Conference on Next Generation Mobile Apps Services and
Technologies (2014), 66-71.
[4] X. Jiang and Y. Zhou, A Survey of Android Malware, Springer, New
York, (2013), 3-20.
[5] V. Y. Zaburdaev, Gaussian Signals, Correlation Matrices and Sample
Path Properties, A First Course in Statistics for Signal Analysis,
Birkhäuser, Boston, (2006), 159-174.
[6] Yanping Xu, Chunhua Wu, Meijia Hou, Kangfeng Zheng and Shan Yao,
Android malware detection technology based on improved Naïve
Bayesian, Journal of Beijing University of Posts and
Telecommunications (2016), 43-47.
[7] A. Feizollah, N. B. Anuar, R. Salleh et al., A review on feature
selection in mobile malware detection, Digital Investigation the
International Journal of Digital Forensics & Incident Response 13(C)
(2015), 22-37.
[8] P. Harrington, Machine Learning in Action, Manning Publications
Co., 2012.
[9] Hui Wang, Hongyu Chen and Shufen Liu, Intrusion detection system
based on improved Naïve Bayesian algorithm, Computer Science 41(4)
(2014), 111-115.
[10] Hang Li, Statistical Learning Method, Tsinghua University Press,
2012.
[11] M. Chandramohan and H. B. K. Tan, Detection of mobile malware in
the wild, Computer 45(9) (2012), 65-71.
[12] Fangping Wu, Dafang Zhang, Xin Su and Xia-an Bi, Based-on network
traffic’s similarity to detect android repackaged application,
Journal of Chinese Computer Systems 36(5) (2015), 954-958.
[13] Xiaofei Wang, Research on Android Malicious Application
Communication Mechanism and Traffic Feature Extraction Based on HTTP,
Hunan University, 2014.
[14] C. Lee and G. G. Lee, Information gain and divergence-based
feature selection for machine learning-based text
categorization, Information Processing & Management 42(1)
(2006), 155-165.
[15] A. G. Karegowda, A. S. Manjunath and M. A. Jayaram, Comparative
study of attribute selection using gain ratio and correlation based
feature selection, International Journal of Information Technology and
Knowledge Management 2(2) (2010), 271-277.
[16] H. Liu and L. Yu, Toward integrating feature selection algorithms
for classification and clustering, IEEE Transactions on Knowledge and
Data Engineering 17(4) (2005), 491-502.
[17] I. Rish, An empirical study of the Naïve Bayes classifier,
IJCAI 2001 workshop on empirical methods in artificial intelligence,
IBM, New York, 3(22) (2001), 41-46.
[18] F. Fuentes and D. C. Kar, Ethereal vs. Tcpdump: A comparative
study on packet sniffing tools for educational purpose, Journal of
Computing Sciences in Colleges 20(4) (2005), 169-176.
[19] V. Jacobson, C. Leres and S. McCanne, The tcpdump manual page,
Lawrence Berkeley Laboratory, Berkeley, CA, (1989), 143.
[20] V. Jacobson, C. Leres and S. McCanne, pcap-Packet Capture
Library, UNIX Man Page, 2001.
[21] J. Davis and M. Goadrich, The relationship between
Precision-Recall and ROC curves, Proceedings of the 23rd International
Conference on Machine Learning, ACM (2006), 233-240.
[22] J. Fan, S. Upadhye and A. Worster, Understanding receiver
operating characteristic (ROC) curves, CJEM 8(01) (2006), 19-20.
[23] D. J. C. MacKay, Information Theory, Inference and Learning
Algorithms, Cambridge University Press, 2003.
[24] VirusShare, Virusshare.com-because sharing is caring,
http://virusshare.com/, 2013. Accessed Dec. 10, 2013.
[25] W. Enck, D. Octeau, P. McDaniel et al., A study of android
application security, USENIX Security Symposium 2 (2011), 2.