Results 211 to 220 of about 20,046 (244)
Some of the next articles are maybe not open access.

Android malware and mitigations

Network Security, 2012
Just as the ubiquitous nature of Windows made it an enticing target for malware writers and cyber-criminals, so it is with Android. The maliciously inclined have not been slow to exploit the popularity of the platform. Steve Mansfield-Devine examines the nature of the malware problem and how Google's open approach to distribution makes implementing ...
openaire   +1 more source

Android Malware Detection

2023 World Conference on Communication & Computing (WCONF), 2023
N Gagan   +4 more
openaire   +1 more source

Identifying Android Malware Families Using Android-Oriented Metrics

2019 IEEE International Conference on Big Data (Big Data), 2019
Android malware (malicious apps) families share common attributes and behavior through sharing core malicious code. However, as the number of new malware increases, the task of identifying the correct family becomes more challenging. Two prominent approaches tackle this problem, either using dynamic analysis that captures the runtime behavior of the ...
William Blanc   +3 more
openaire   +1 more source

CNN-Based Android Malware Detection

2017 International Conference on Software Security and Assurance (ICSSA), 2017
The growth in mobile devices has exponentially increased, making information easy to access but at the same time vulnerable. Malicious applications can gain access to sensitive and critical user information by exploiting unsolicited permission controls.
Meenu Ganesh   +5 more
openaire   +1 more source

Android malware analysis and conceptual malware mitigation approaches

2016 International Conference on Information and Communication Technology Convergence (ICTC), 2016
Mobile devices have enjoyed unprecedented growth in the last decade. As devices become more ubiquitous and users place more sensitive data on their devices, the amount of mobile malware in the wild has grown. In order to protect mobile device users and their data, mobile security solutions have been brought to market for consumer and enterprise users ...
Tae Oh   +4 more
openaire   +1 more source

Adaptive Android Malware Signature Detection

Proceedings of the 2018 International Conference on Communication Engineering and Technology, 2018
This paper proposes signature-based malware detection using permission and broadcast-receiver data, which is extracted from the manifest file. The malicious signatures are constructed from 800 applications thru the filtering and statistical processes. The detection result showed that malicious signatures used to detect the malicious applications had 86.
Suparerk Ngamwitroj   +1 more
openaire   +1 more source

Android Malware Detection Techniques

2019
Importance of personal data has increased along with the evolution of technology. To steal and misuse this data, malicious programs and software are written to exploit the vulnerabilities of the current system. These programs are referred to as malware. Malware harasses the users until their intentions are fulfilled.
Shreya Khemani   +2 more
openaire   +1 more source

Android Malware

2022
Tony Thomas   +3 more
openaire   +1 more source

Infrastructure for Detecting Android Malware

2013
Malware for smartphones have sky-rocketed these last years, particularly for Android platforms. To tackle this threat, services such as Google Bouncer have intended to counter-attack. However, it has been of short duration since the malware have circumvented the service by changing their behaviors.
Laurent Delosières, David García
openaire   +1 more source

A Survey of Android Malware Detection with Deep Neural Models

ACM Computing Surveys, 2021
Jun-Yang Qiu, Jun Zhang, Wei Luo
exaly  

Home - About - Disclaimer - Privacy