Results 31 to 40 of about 3,123 (222)

DroidPortrait: Android Malware Portrait Construction Based on Multidimensional Behavior Analysis

open access: yesApplied Sciences, 2020
Recently, security incidents such as sensitive data leakage and video/audio hardware control caused by Android malware have raised severe security issues that threaten Android users, so thus behavior analysis and detection research researches of ...
Xin Su   +5 more
doaj   +1 more source

Review of Android Malware Detection Based on Deep Learning

open access: yesIEEE Access, 2020
At present, smartphones running the Android operating system have occupied the leading market share. However, due to the Android operating system's open-source nature, Android malware has increased dramatically.
Zhiqiang Wang, Qian Liu, Yaping Chi
doaj   +1 more source

A Method for Automatic Android Malware Detection Based on Static Analysis and Deep Learning

open access: yesIEEE Access, 2022
The computers nowadays are being replaced by the smartphones for the most of the internet users around the world, and Android is getting the most of the smartphone systems’ market.
Mulhem Ibrahim   +2 more
doaj   +1 more source

Z2F: Heterogeneous graph-based Android malware detection. [PDF]

open access: yesPLoS One
Android malware is becoming more common, and its invasion of smart devices has brought immeasurable losses to people’s lives. Most existing Android malware detection methods extract Android features from the original application files without considering the high-order hidden information behind them, but these hidden information can reflect malicious ...
Ma Z, Luktarhan N.
europepmc   +4 more sources

TTGNet-AMD: Android malware detection based on multi-modal feature fusion [PDF]

open access: yesPeerJ Computer Science
The application of static features for Android malware detection has been extensively studied and developed. Existing methods exhibit limitations in both the completeness and discriminability of feature representation, which affects the enhancement of ...
Jiayin Feng   +5 more
doaj   +2 more sources

A Lightweight Multi-Source Fast Android Malware Detection Model

open access: yesApplied Sciences, 2022
Most of the current malware detection methods running on Android are based on signature and cloud technologies leading to poor protection against new types of malware. Deep learning techniques take Android malware detection to a new level.
Tao Peng   +6 more
doaj   +1 more source

A machine learning technique for Android malicious attacks detection based on API calls [PDF]

open access: yesDecision Science Letters
Android malware is widespread and it is considered as one of the most threatening attacks recently. The threat is targeting to damage access data or information or leaking them; in general, malicious software consists of viruses, worms, and ...
Mousa AL-Akhras   +3 more
doaj   +1 more source

DroidEnemy: Battling adversarial example attacks for Android malware detection

open access: yesDigital Communications and Networks, 2022
In recent years, we have witnessed a surge in mobile devices such as smartphones, tablets, smart watches, etc., most of which are based on the Android operating system. However, because these Android-based mobile devices are becoming increasingly popular,
Neha Bala   +5 more
doaj   +1 more source

Improved chimp optimization algorithm (ICOA) feature selection and deep neural network framework for internet of things (IOT) based android malware detection

open access: yesMeasurement: Sensors, 2023
Internet of Things (IoT) is extensively implemented using Android applications thus detecting malicious Android apps is necessary. Malicious has been multiplying fast as a result of the growing usage of smartphones.
Tirumala Vasu G   +5 more
doaj   +1 more source

GA-StackingMD: Android Malware Detection Method Based on Genetic Algorithm Optimized Stacking

open access: yesApplied Sciences, 2023
With the rapid development of network and mobile communication, intelligent terminals such as smartphones and tablet computers have changed people’s daily life and work.
Nannan Xie, Zhaowei Qin, Xiaoqiang Di
doaj   +1 more source

Home - About - Disclaimer - Privacy