Results 21 to 30 of about 11,847 (201)

Android malware category detection using a novel feature vector-based machine learning model

open access: yesCybersecurity, 2023
Malware attacks on the Android platform are rapidly increasing due to the high consumer adoption of Android smartphones. Advanced technologies have motivated cyber-criminals to actively create and disseminate a wide range of malware on Android ...
Hashida Haidros Rahima Manzil   +1 more
doaj   +1 more source

A Survey and Evaluation of Android-Based Malware Evasion Techniques and Detection Frameworks

open access: yesInformation, 2023
Android platform security is an active area of research where malware detection techniques continuously evolve to identify novel malware and improve the timely and accurate detection of existing malware.
Parvez Faruki   +5 more
doaj   +1 more source

Explaining Black-box Android Malware Detection [PDF]

open access: yes2018 26th European Signal Processing Conference (EUSIPCO), 2018
Machine-learning models have been recently used for detecting malicious Android applications, reporting impressive performances on benchmark datasets, even when trained only on features statically extracted from the application, such as system calls and permissions.
Marco Melis   +4 more
openaire   +4 more sources

Gauss-Mapping Black Widow Optimization With Deep Extreme Learning Machine for Android Malware Classification Model

open access: yesIEEE Access, 2023
Nowadays, the malware on the Android platform is found to be increasing. With the prevalent use of code obfuscation technology, the precision of antivirus software and classical detection techniques is low.
Ghadah Aldehim   +7 more
doaj   +1 more source

Android Malware Detection Using Deep Learning

open access: yes, 2022
This chapter investigates the potential of deep learning architectures for Android malware detection, specifically convolutional neural networks (CNNs) using natural language processing (NLP) concepts. The proposed solution is based on static analysis of raw opcode sequences from disassembled programs and other complementary features such as API calls ...
Millar, Stuart   +3 more
openaire   +3 more sources

Android Malware Characterization using Metadata and Machine Learning Techniques [PDF]

open access: yes, 2017
Android Malware has emerged as a consequence of the increasing popularity of smartphones and tablets. While most previous work focuses on inherent characteristics of Android apps to detect malware, this study analyses indirect features and meta-data to ...
Guzmán, Antonio   +3 more
core   +2 more sources

Detection and Prevention of Malware in Android Operating System

open access: yesMehran University Research Journal of Engineering and Technology, 2021
The Internet is not safe anymore, malware can be discovered anywhere on the Internet. The risk of malware has increased also due to the increasing popularity and use of Smartphones and their underlying cost-free applications. With its great market share,
Kashif Ali Dahri   +2 more
doaj   +1 more source

Android malware detection: a survey [PDF]

open access: yesSCIENTIA SINICA Informationis, 2020
Android has become the most popular mobile operating system in the past ten years due to its three main advantages, namely, the openness of source code, richness of hardware selection, and millions of applications (apps). It is of no surprise that Android has become the major target of malware.
Le YU   +5 more
openaire   +1 more source

An Android Malicious Code Detection Method Based on Improved DCA Algorithm

open access: yesEntropy, 2017
Recently, Android malicious code has increased dramatically and the technology of reinforcement is increasingly powerful. Due to the development of code obfuscation and polymorphic deformation technology, the current Android malicious code static ...
Chundong Wang   +5 more
doaj   +1 more source

A Dynamic DL-Driven Architecture to Combat Sophisticated Android Malware

open access: yesIEEE Access, 2020
The predominant Android operating system has captured enormous attention globally not only in smart phone industry but also for varied smart devices.
Iram Bibi   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy