Results 101 to 110 of about 20,533 (244)
Android Malware Detection by Correlated Real Permission Couples Using FP Growth Algorithm and Neural Networks [PDF]
Abhinandan Banik, Jyoti Prakash Singh
openalex +1 more source
With an increase in the number and complexity of malware, traditional malware detection methods such as heuristic-based and signature-based ones have become less adequate, leaving user applications vulnerable.
Abdurraheem Joomye +4 more
doaj +1 more source
A3CM: Automatic Capability Annotation for Android Malware
Android malware poses serious security and privacy threats to the mobile users. Traditional malware detection and family classification technologies are becoming less effective due to the rapid evolution of the malware landscape, with the emerging of so ...
Junyang Qiu +6 more
doaj +1 more source
Android Malware Detection Based on Feature Selection and Weight Measurement [PDF]
Huizhong Sun +3 more
openalex +1 more source
Using Dalvik opcodes for malware detection on android [PDF]
José Gaviria de la Puerta, Borja Sanz
openalex +1 more source
Explaining the Use of Cryptographic API in Android Malware [PDF]
Adam Janovsky +4 more
openalex +1 more source
MADRAS-NET: A deep learning approach for detecting and classifying android malware using Linknet
Malware is an intentionally created malicious software that still poses a serious threat in cyberspace. Android malware has become one of the most significant online threats in recent years due to its increase in prevalence. Even though a lot of work has
Yi Wang, Shanshan Jia
doaj +1 more source
AndroDFA: Android Malware Classification Based on Resource Consumption [PDF]
Luca Massarelli +5 more
openalex +1 more source
Android malware dataset construction methodology to minimize bias–variance tradeoff
Shinho Lee +4 more
openalex +1 more source
MalQwen: Fine Tuned LLM for Static Android Malware Analysis Report
The Android operating system continues to face escalating security challenges, primarily due to its open-source nature and the rapid proliferation of applications from untrusted sources.
Tegar Ganang Satrio Priambodo +7 more
doaj +1 more source

