SlideShare a Scribd company logo
1 of 52
Download to read offline
Anomaly Detection using
String Analysis for
Android Malware Detection
Borja Sanz
Igor Santos
Xabier Ugarte-Pedrero
Carlos Laorden
Javier Nieves
Pablo G. Bringas
In the past 10 years
mobile phones
have evolved
In fact, now they are called
smartphones
108 million
iPhones sold
1955
Android devices activated
since
I started this presentation
1972
Android devices activated
since
I started this presentation
2006
Android devices activated
since
I started this presentation
2023
Android devices activated
since
I started this presentation
1.5 million every day
It is a
revolution
Emails
Pictures
Vídeos
IM
Web history
Documents
Geoposition
Movements
Microphone
Camera
Call history
Wallet
Let me ask you…
Would you
lend me
your
smartphone?
(no doubts)
Have you
ever lost a
cellphone?
(feeling?)
We carry
sensitive information
in our pockets
What about
security?
is there
malware
in Android?
Malware in Android
Malwareis one of the most
important issues in Android
But I onlydownload apks
from the market…
New
detection
methods
are necessary
Anomaly detection
method for
Android malware
detection
1Dataset creation
Benign software
(goodware)
Malicious software
(malware)
Malware dataset
AV evaluation
Evaluation of samples based on the
detected AV
Threshold defintion
Remove duplicate samples
1,938
samples
333
samples
Goodware dataset
game
333
samples
2Feature selection
Strings
const-string v6, "TEST CONSTANT"
const-string v6, "THE VARIABLE"
THE VARIABLE TEST CONSTANT( , , )
S1 ( 0 , 1 , 1 )
S2 ( 1 , 0 , 0 )
t1
t2
t3
D1
D2
D3
D9
D7
D5
D6
3Anomaly Detection
?
?
Anomaly detection
d
d < threshold?
> threshold?
Manhattan distance
Euclidean distance
Cosine distance
d
d
Anomaly detection
Minimum distance
Maximum distance
Mean distance
Minimum
distance
Maximum
distance
Mean
distance
Manhattan
distance
Euclidean
Distance
Cosine
distance
10
different
thresholds
Anomaly detection
d
d > threshold?
> threshold?
min
max
Minimum
distance
Maximum
distance
Mean
distance
Manhattan
distance
Euclidean
distance
10
thresholds
5-fold
Cross-validation
4Results
TPR, FPR, Accuracy
Manhattan Euclidean Cosine
Area Under the Curve
Manhattan Euclidean Cosine
0.88
Only consider
bening samples to
measure distances
Future work
Other feature sets
Other distances and
selection rules
Dynamic analysis
We still have a long
way to go
References
1. Androides: http://fondosbonitos.com/file/663/2560x1440/crop/androides.jpg
2. Nexus phone: http://p.playserver1.
com/ProductImages/5/5/7/3/1/4/5/2/25413755_700x700min_1.jpg
3. Apple Hacker: http://techbeat.com/wp-content/uploads/2012/09/Apple-Hacker-
Heads-to-Twitter.jpg
4. Botnet costume: http://jon.oberheide.org/blog/wp-
content/uploads/2007/01/costume2.jpg
5. Zombie bird: http://payload66.cargocollective.com/1/1/49299/3633335/an2.jpg
6. Toy Story command rescue: http://img.rakuten.
com/PIC/4498966/0/1/500/4498966.jpg
7. Back to the future car: http://www.wallpaperfo.
com/Abstract/High_definition/cars_high_definition_back_to_the_future_delorean_dmc1
2_1920x1080_wallpaper_518/download_2560x1440
8. Long way: http://hakimiyetimilliye.org/wp-content/uploads/2013/02/%D8%B7%D8%
B1%D9%8A%D9%82-1.jpg

More Related Content

What's hot

Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicro
Droidcon Berlin
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaper
Harsimran Walia
 
CopperDroid - On the Reconstruction of Android Apps Behaviors
CopperDroid - On the Reconstruction of Android Apps BehaviorsCopperDroid - On the Reconstruction of Android Apps Behaviors
CopperDroid - On the Reconstruction of Android Apps Behaviors
FACE
 
Mitigating Privilege-Escalation Attacks on Android Report
Mitigating Privilege-Escalation Attacks on Android  ReportMitigating Privilege-Escalation Attacks on Android  Report
Mitigating Privilege-Escalation Attacks on Android Report
Vinoth Kanna
 
Mobile application security
Mobile application securityMobile application security
Mobile application security
Shubhneet Goel
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
AP DealFlow
 
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
Stephan Chenette
 

What's hot (20)

Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicro
 
Malware detection techniques for mobile devices
Malware detection techniques for mobile devicesMalware detection techniques for mobile devices
Malware detection techniques for mobile devices
 
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICESMALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaper
 
Security News bytes October 2013
Security News bytes  October 2013Security News bytes  October 2013
Security News bytes October 2013
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection System
 
CopperDroid - On the Reconstruction of Android Apps Behaviors
CopperDroid - On the Reconstruction of Android Apps BehaviorsCopperDroid - On the Reconstruction of Android Apps Behaviors
CopperDroid - On the Reconstruction of Android Apps Behaviors
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniques
 
Mitigating Privilege-Escalation Attacks on Android Report
Mitigating Privilege-Escalation Attacks on Android  ReportMitigating Privilege-Escalation Attacks on Android  Report
Mitigating Privilege-Escalation Attacks on Android Report
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 
Mobile Apps Security Testing -1
Mobile Apps Security Testing -1Mobile Apps Security Testing -1
Mobile Apps Security Testing -1
 
Androinspector a system for
Androinspector a system forAndroinspector a system for
Androinspector a system for
 
43 automatic
43 automatic43 automatic
43 automatic
 
Mobile Apps Security Testing -3
Mobile Apps Security Testing -3Mobile Apps Security Testing -3
Mobile Apps Security Testing -3
 
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET-  	  A Review on Several Vulnerabilities Detection Techniques in Androi...IRJET-  	  A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
 
Mobile application security
Mobile application securityMobile application security
Mobile application security
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
 
Secure Android Apps- nVisium Security
Secure Android Apps- nVisium SecuritySecure Android Apps- nVisium Security
Secure Android Apps- nVisium Security
 
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
 

Viewers also liked

Applications of genetic algorithms to malware detection and creation
Applications of genetic algorithms to malware detection and creationApplications of genetic algorithms to malware detection and creation
Applications of genetic algorithms to malware detection and creation
UltraUploader
 
FooCodeChu - Services for Software Analysis, Malware Detection, and Vulnerabi...
FooCodeChu - Services for Software Analysis, Malware Detection, and Vulnerabi...FooCodeChu - Services for Software Analysis, Malware Detection, and Vulnerabi...
FooCodeChu - Services for Software Analysis, Malware Detection, and Vulnerabi...
Silvio Cesare
 
Android Malware Detection Mechanisms
Android Malware Detection MechanismsAndroid Malware Detection Mechanisms
Android Malware Detection Mechanisms
Talha Kabakus
 
Image pre processing
Image pre processingImage pre processing
Image pre processing
Ashish Kumar
 

Viewers also liked (20)

Zero Day Malware Detection/Prevention Using Open Source Software
Zero Day Malware Detection/Prevention Using Open Source SoftwareZero Day Malware Detection/Prevention Using Open Source Software
Zero Day Malware Detection/Prevention Using Open Source Software
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Automated polyp detection in colon...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Automated polyp detection in colon...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Automated polyp detection in colon...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Automated polyp detection in colon...
 
Agnesian HealthCare Know & Go Showcase: Colonoscopies are lifesavers!
Agnesian HealthCare Know & Go Showcase: Colonoscopies are lifesavers!Agnesian HealthCare Know & Go Showcase: Colonoscopies are lifesavers!
Agnesian HealthCare Know & Go Showcase: Colonoscopies are lifesavers!
 
Agnesian HealthCare Know & Go Friday, January 2017: Integrative Health
Agnesian HealthCare Know & Go Friday, January 2017: Integrative HealthAgnesian HealthCare Know & Go Friday, January 2017: Integrative Health
Agnesian HealthCare Know & Go Friday, January 2017: Integrative Health
 
Challenges in High Accuracy of Malware Detection
Challenges in High Accuracy of Malware DetectionChallenges in High Accuracy of Malware Detection
Challenges in High Accuracy of Malware Detection
 
Applications of genetic algorithms to malware detection and creation
Applications of genetic algorithms to malware detection and creationApplications of genetic algorithms to malware detection and creation
Applications of genetic algorithms to malware detection and creation
 
FooCodeChu - Services for Software Analysis, Malware Detection, and Vulnerabi...
FooCodeChu - Services for Software Analysis, Malware Detection, and Vulnerabi...FooCodeChu - Services for Software Analysis, Malware Detection, and Vulnerabi...
FooCodeChu - Services for Software Analysis, Malware Detection, and Vulnerabi...
 
Seminar
SeminarSeminar
Seminar
 
Malware Detection With Multiple Features
Malware Detection With Multiple FeaturesMalware Detection With Multiple Features
Malware Detection With Multiple Features
 
Capsule endoscopy
Capsule endoscopyCapsule endoscopy
Capsule endoscopy
 
Ensembled Based Categorization and Adaptive Learning Model for Malware Detection
Ensembled Based Categorization and Adaptive Learning Model for Malware DetectionEnsembled Based Categorization and Adaptive Learning Model for Malware Detection
Ensembled Based Categorization and Adaptive Learning Model for Malware Detection
 
Android Malware Detection Mechanisms
Android Malware Detection MechanismsAndroid Malware Detection Mechanisms
Android Malware Detection Mechanisms
 
Next Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and DefenseNext Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and Defense
 
Pill camera
Pill cameraPill camera
Pill camera
 
pill camera
pill camerapill camera
pill camera
 
Malware Detection - A Machine Learning Perspective
Malware Detection - A Machine Learning PerspectiveMalware Detection - A Machine Learning Perspective
Malware Detection - A Machine Learning Perspective
 
Image pre processing
Image pre processingImage pre processing
Image pre processing
 
Pill Camera ppt
Pill Camera pptPill Camera ppt
Pill Camera ppt
 
PILL CAMERA
PILL CAMERAPILL CAMERA
PILL CAMERA
 
Malware Detection Using Machine Learning Techniques
Malware Detection Using Machine Learning TechniquesMalware Detection Using Machine Learning Techniques
Malware Detection Using Machine Learning Techniques
 

Similar to Anomaly Detection using String Analysis for Android Malware Detection - CISIS 2013

1 ) a) Android Security One of the biggest challange is android sm.pdf
1 ) a) Android Security  One of the biggest challange is android sm.pdf1 ) a) Android Security  One of the biggest challange is android sm.pdf
1 ) a) Android Security One of the biggest challange is android sm.pdf
angelnxcom
 

Similar to Anomaly Detection using String Analysis for Android Malware Detection - CISIS 2013 (20)

Android malware overview, status and dilemmas
Android malware  overview, status and dilemmasAndroid malware  overview, status and dilemmas
Android malware overview, status and dilemmas
 
Android forensics
Android forensicsAndroid forensics
Android forensics
 
Smau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSmau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano Zanero
 
Ai presentation on using of Artificial intelligence in smart cities
Ai presentation on using of Artificial intelligence in smart citiesAi presentation on using of Artificial intelligence in smart cities
Ai presentation on using of Artificial intelligence in smart cities
 
The Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOSThe Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOS
 
Ej4301823826
Ej4301823826Ej4301823826
Ej4301823826
 
1 ) a) Android Security One of the biggest challange is android sm.pdf
1 ) a) Android Security  One of the biggest challange is android sm.pdf1 ) a) Android Security  One of the biggest challange is android sm.pdf
1 ) a) Android Security One of the biggest challange is android sm.pdf
 
Sixth Sense (The Future of Technology)
Sixth Sense (The Future of Technology)Sixth Sense (The Future of Technology)
Sixth Sense (The Future of Technology)
 
Wearable Technology Presentation by CBS and SEAS
Wearable Technology Presentation by CBS and SEASWearable Technology Presentation by CBS and SEAS
Wearable Technology Presentation by CBS and SEAS
 
_The Latest Advancements in Spy Camera Detection Technology.pptx
_The Latest Advancements in Spy Camera Detection Technology.pptx_The Latest Advancements in Spy Camera Detection Technology.pptx
_The Latest Advancements in Spy Camera Detection Technology.pptx
 
TECHNOLOGY: Solution to our woos not Politicians & INTERNET of THINGS in Nuts...
TECHNOLOGY: Solution to our woos not Politicians & INTERNET of THINGS in Nuts...TECHNOLOGY: Solution to our woos not Politicians & INTERNET of THINGS in Nuts...
TECHNOLOGY: Solution to our woos not Politicians & INTERNET of THINGS in Nuts...
 
Intro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngIntro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web Designinng
 
What's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacyWhat's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacy
 
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
 
16190734.ppt
16190734.ppt16190734.ppt
16190734.ppt
 
How to Avoid IoTageddon
How to Avoid IoTageddon How to Avoid IoTageddon
How to Avoid IoTageddon
 
Research in progress defending android smartphones from malware attacks
Research in progress  defending android smartphones from malware attacksResearch in progress  defending android smartphones from malware attacks
Research in progress defending android smartphones from malware attacks
 
Seetu
SeetuSeetu
Seetu
 
Panda labs annual report 2012
Panda labs annual report 2012Panda labs annual report 2012
Panda labs annual report 2012
 
Panda labs annual-report-2012
Panda labs annual-report-2012Panda labs annual-report-2012
Panda labs annual-report-2012
 

More from Carlos Laorden

More from Carlos Laorden (10)

Collective Classification for Packed Executable Identification - CEAS 2011
Collective Classification for Packed Executable Identification - CEAS 2011Collective Classification for Packed Executable Identification - CEAS 2011
Collective Classification for Packed Executable Identification - CEAS 2011
 
Collective classification for unknown malware detection - SECRYPT 2011
Collective classification for unknown malware detection - SECRYPT 2011Collective classification for unknown malware detection - SECRYPT 2011
Collective classification for unknown malware detection - SECRYPT 2011
 
Puma: Permission Usage to detect Malware in Android - CISIS 2012
Puma: Permission Usage to detect Malware in Android - CISIS 2012Puma: Permission Usage to detect Malware in Android - CISIS 2012
Puma: Permission Usage to detect Malware in Android - CISIS 2012
 
A Threat Model Approach to Threats and Vulnerabilities in On-line Social Netw...
A Threat Model Approach to Threats and Vulnerabilities in On-line Social Netw...A Threat Model Approach to Threats and Vulnerabilities in On-line Social Netw...
A Threat Model Approach to Threats and Vulnerabilities in On-line Social Netw...
 
Negobot: A conversational agent based on game theory for the detection of pae...
Negobot: A conversational agent based on game theory for the detection of pae...Negobot: A conversational agent based on game theory for the detection of pae...
Negobot: A conversational agent based on game theory for the detection of pae...
 
Twitter Content-based Spam Filtering - CISIS 2013
Twitter Content-based Spam Filtering - CISIS 2013Twitter Content-based Spam Filtering - CISIS 2013
Twitter Content-based Spam Filtering - CISIS 2013
 
Enhancing Scalability in Anomaly-based Email Spam Filtering - CEAS 2011
Enhancing Scalability in Anomaly-based Email Spam Filtering - CEAS 2011Enhancing Scalability in Anomaly-based Email Spam Filtering - CEAS 2011
Enhancing Scalability in Anomaly-based Email Spam Filtering - CEAS 2011
 
Collective Classification for Spam Filtering - CISIS 2011
Collective Classification for Spam Filtering - CISIS 2011Collective Classification for Spam Filtering - CISIS 2011
Collective Classification for Spam Filtering - CISIS 2011
 
On the Study of Anomaly-based Spam Filtering Using Spam as Representation of ...
On the Study of Anomaly-based Spam Filtering Using Spam as Representation of ...On the Study of Anomaly-based Spam Filtering Using Spam as Representation of ...
On the Study of Anomaly-based Spam Filtering Using Spam as Representation of ...
 
Anomaly-based Spam Filtering - SECRYPT 2011
Anomaly-based Spam Filtering - SECRYPT 2011Anomaly-based Spam Filtering - SECRYPT 2011
Anomaly-based Spam Filtering - SECRYPT 2011
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 

Anomaly Detection using String Analysis for Android Malware Detection - CISIS 2013