Two effective methods to detect mobile malware | IEEE Conference Publication | IEEE Xplore