Results 211 to 220 of about 20,046 (244)
Some of the next articles are maybe not open access.
Android malware and mitigations
Network Security, 2012Just as the ubiquitous nature of Windows made it an enticing target for malware writers and cyber-criminals, so it is with Android. The maliciously inclined have not been slow to exploit the popularity of the platform. Steve Mansfield-Devine examines the nature of the malware problem and how Google's open approach to distribution makes implementing ...
openaire +1 more source
2023 World Conference on Communication & Computing (WCONF), 2023
N Gagan +4 more
openaire +1 more source
N Gagan +4 more
openaire +1 more source
Identifying Android Malware Families Using Android-Oriented Metrics
2019 IEEE International Conference on Big Data (Big Data), 2019Android malware (malicious apps) families share common attributes and behavior through sharing core malicious code. However, as the number of new malware increases, the task of identifying the correct family becomes more challenging. Two prominent approaches tackle this problem, either using dynamic analysis that captures the runtime behavior of the ...
William Blanc +3 more
openaire +1 more source
CNN-Based Android Malware Detection
2017 International Conference on Software Security and Assurance (ICSSA), 2017The growth in mobile devices has exponentially increased, making information easy to access but at the same time vulnerable. Malicious applications can gain access to sensitive and critical user information by exploiting unsolicited permission controls.
Meenu Ganesh +5 more
openaire +1 more source
Android malware analysis and conceptual malware mitigation approaches
2016 International Conference on Information and Communication Technology Convergence (ICTC), 2016Mobile devices have enjoyed unprecedented growth in the last decade. As devices become more ubiquitous and users place more sensitive data on their devices, the amount of mobile malware in the wild has grown. In order to protect mobile device users and their data, mobile security solutions have been brought to market for consumer and enterprise users ...
Tae Oh +4 more
openaire +1 more source
Adaptive Android Malware Signature Detection
Proceedings of the 2018 International Conference on Communication Engineering and Technology, 2018This paper proposes signature-based malware detection using permission and broadcast-receiver data, which is extracted from the manifest file. The malicious signatures are constructed from 800 applications thru the filtering and statistical processes. The detection result showed that malicious signatures used to detect the malicious applications had 86.
Suparerk Ngamwitroj +1 more
openaire +1 more source
Android Malware Detection Techniques
2019Importance of personal data has increased along with the evolution of technology. To steal and misuse this data, malicious programs and software are written to exploit the vulnerabilities of the current system. These programs are referred to as malware. Malware harasses the users until their intentions are fulfilled.
Shreya Khemani +2 more
openaire +1 more source
Infrastructure for Detecting Android Malware
2013Malware for smartphones have sky-rocketed these last years, particularly for Android platforms. To tackle this threat, services such as Google Bouncer have intended to counter-attack. However, it has been of short duration since the malware have circumvented the service by changing their behaviors.
Laurent Delosières, David García
openaire +1 more source
A Survey of Android Malware Detection with Deep Neural Models
ACM Computing Surveys, 2021Jun-Yang Qiu, Jun Zhang, Wei Luo
exaly

