Academic literature on the topic 'Mobile malware detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mobile malware detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Mobile malware detection"
Yildiz, Oktay, and Ibrahim Alper Doğru. "Permission-based Android Malware Detection System Using Feature Selection with Genetic Algorithm." International Journal of Software Engineering and Knowledge Engineering 29, no. 02 (February 2019): 245–62. http://dx.doi.org/10.1142/s0218194019500116.
Full textSwetha, K., and K. V.D.Kiran. "Survey on Mobile Malware Analysis and Detection." International Journal of Engineering & Technology 7, no. 2.32 (May 31, 2018): 279. http://dx.doi.org/10.14419/ijet.v7i2.32.15584.
Full textJang, Jae-wook, and Huy Kang Kim. "Function-Oriented Mobile Malware Analysis as First Aid." Mobile Information Systems 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/6707524.
Full textM., Duraipandian, and Vinothkanna R. "MACHINE LEARNING BASED AUTOMATIC PERMISSION GRANTING AND MALWARE IDENTIFICATION." December 2019 01, no. 02 (December 23, 2019): 96–107. http://dx.doi.org/10.36548/jitdw.2019.2.005.
Full textBibi, Iram, Adnan Akhunzada, Jahanzaib Malik, Muhammad Khurram Khan, and Muhammad Dawood. "Secure Distributed Mobile Volunteer Computing with Android." ACM Transactions on Internet Technology 22, no. 1 (February 28, 2022): 1–21. http://dx.doi.org/10.1145/3428151.
Full textDu, Yao, Mengtian Cui, and Xiaochun Cheng. "A Mobile Malware Detection Method Based on Malicious Subgraphs Mining." Security and Communication Networks 2021 (April 17, 2021): 1–11. http://dx.doi.org/10.1155/2021/5593178.
Full textHe, Gaofeng, Bingfeng Xu, Lu Zhang, and Haiting Zhu. "On-Device Detection of Repackaged Android Malware via Traffic Clustering." Security and Communication Networks 2020 (May 31, 2020): 1–19. http://dx.doi.org/10.1155/2020/8630748.
Full textMazaed Alotaibi, Fahad, and Fawad. "A Multifaceted Deep Generative Adversarial Networks Model for Mobile Malware Detection." Applied Sciences 12, no. 19 (September 20, 2022): 9403. http://dx.doi.org/10.3390/app12199403.
Full textRahul Y. Pawar, Mr, and Dr C.Mahesh. "A Survey on Malware Detection Techniques on Linux Powered Smart Phones using Machine Learning Approaches." International Journal of Engineering & Technology 7, no. 3.34 (September 1, 2018): 8. http://dx.doi.org/10.14419/ijet.v7i3.34.18706.
Full textGuo, Dai Fei, Jian Jun Hu, Ai Fen Sui, Guan Zhou Lin, and Tao Guo. "The Abnormal Mobile Malware Analysis Based on Behavior Categorization." Advanced Materials Research 765-767 (September 2013): 994–97. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.994.
Full textDissertations / Theses on the topic "Mobile malware detection"
Khoda, Mahbub. "Robust Mobile Malware Detection." Thesis, Federation University Australi, 2020. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/176412.
Full textDoctor of Philosophy
Kinable, Joris. "Malware Detection Through Call Graphs." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10908.
Full textAl, Sebea Hussain. "Dynamic detection and immunisation of malware using mobile agents." Thesis, Edinburgh Napier University, 2005. http://researchrepository.napier.ac.uk/output/4036/.
Full textBurguera, Hidalgo Iker. "Behavior-based malware detection system for the Android platform." Thesis, Linköpings universitet, RTSLAB - Laboratoriet för realtidssystem, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73647.
Full textGitzinger, Louison. "Surviving the massive proliferation of mobile malware." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S058.
Full textNowadays, many of us are surrounded by smart devices that seamlessly operate interactively and autonomously together with multiple services to make our lives more comfortable. These smart devices are part of larger ecosystems, in which various companies collaborate to ease the distribution of applications between developers and users. However malicious attackers take advantage of them illegitimately to infect users' smart devices with malicious applications. Despite all the efforts made to defend these ecosystems, the rate of devices infected with malware is still increasing in 2020. In this thesis, we explore three research axes with the aim of globally improving malware detection in the Android ecosystem. We demonstrate that the accuracy of machine learning-based detection systems can be improved by automating their evaluation and by reusing the concept of AutoML to fine-tune learning algorithms parameters. We propose an approach to automatically create malware variants from combinations of complex evasion techniques to diversify experimental malware datasets in order to challenge existing detection systems. Finally, we propose methods to globally increase the quality of experimental datasets used to train and test detection systems
Adeel, Muhammad. "Adaptive mobile P2P malware detection using social interactions based digital footprints." Thesis, Queen Mary, University of London, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.612575.
Full textVural, Ickin. "Spamming mobile botnet detection using computational intelligence." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/36775.
Full textDissertation (MSc)--University of Pretoria, 2013.
gm2014
Computer Science
unrestricted
Arp, Daniel Christopher Verfasser], Konrad [Akademischer Betreuer] [Rieck, and Lorenzo [Akademischer Betreuer] Cavallaro. "Efficient and Explainable Detection of Mobile Malware with Machine Learning / Daniel Christopher Arp ; Konrad Rieck, Lorenzo Cavallaro." Braunschweig : Technische Universität Braunschweig, 2019. http://d-nb.info/1195705018/34.
Full textArp, Daniel Christopher [Verfasser], Konrad [Akademischer Betreuer] Rieck, and Lorenzo [Akademischer Betreuer] Cavallaro. "Efficient and Explainable Detection of Mobile Malware with Machine Learning / Daniel Christopher Arp ; Konrad Rieck, Lorenzo Cavallaro." Braunschweig : Technische Universität Braunschweig, 2019. http://d-nb.info/1195705018/34.
Full textIrolla, Paul. "Formalization of Neural Network Applications to Secure 3D Mobile Applications." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLS585/document.
Full textThis thesis work is part of the 3D NeuroSecure project. It is an investment project, that aims to develop a secure collaborative solution for therapeutic innovation using high performance processing(HPC) technology to the biomedical world. This solution will give the opportunity for experts from different fields to navigate intuitivelyin the Big Data imaging with access via 3D light terminals. Biomedicaldata protection against data leaks is of foremost importance. As such,the client environnement and communications with the server must besecured. We focused our work on the development of antimalware solutionon the Android OS. We emphasizes the creation of new algorithms,methods and tools that carry advantages over the current state-of-the-art, but more importantly that can be used effectively ina production context. It is why, what is proposed here is often acompromise between what theoretically can be done and its applicability. Algorithmic and technological choices are motivated by arelation of efficiency and performance results. This thesis contributes to the state of the art in the following areas:Static and dynamic analysis of Android applications, application web crawling.First, to search for malicious activities and vulnerabilities, oneneeds to design the tools that extract pertinent information from Android applications. It is the basis of any analysis. Furthermore,any classifier or detector is always limited by the informative power of underlying data. An important part of this thesis is the designing of efficient static and dynamic analysis tools forapplications, such as an reverse engineering module, a networkcommunication analysis tool, an instrumented Android system, an application web crawlers etc.Neural Network initialization, training and anti-saturation techniques algorithm.Neural Networks are randomly initialized. It is possible to control the underlying random distribution in order to the reduce the saturation effect, the training time and the capacity to reach theglobal minimum. We developed an initialization procedure that enhances the results compared to the state-of-the-art. We also revisited ADAM algorithm to take into account interdependencies with regularization techniques, in particular Dropout. Last, we use anti-saturation techniques and we show that they are required tocorrectly train a neural network.An algorithm for collecting the common sequences in a sequence group.We propose a new algorithm for building the Embedding Antichain fromthe set of common subsequences. It is able to process and represent allcommon subsequences of a sequence set. It is a tool for solving the Systematic Characterization of Sequence Groups. This algorithm is a newpath of research toward the automatic creation of malware familydetection rules
Books on the topic "Mobile malware detection"
Surendran, Roopak, Teenu S. John, Tony Thomas, and Mamoun Alazab. Intelligent Mobile Malware Detection. Taylor & Francis Group, 2022.
Find full textSurendran, Roopak, Teenu S. John, Tony Thomas, and Mamoun Alazab. Intelligent Mobile Malware Detection. Taylor & Francis Group, 2022.
Find full textSurendran, Roopak, Teenu S. John, Tony Thomas, and Mamoun Alazab. Intelligent Mobile Malware Detection. Taylor & Francis Group, 2022.
Find full textBook chapters on the topic "Mobile malware detection"
Thomas, Tony, Roopak Surendran, Teenu S. John, and Mamoun Alazab. "Android Malware." In Intelligent Mobile Malware Detection, 13–22. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003121510-2.
Full textThomas, Tony, Roopak Surendran, Teenu S. John, and Mamoun Alazab. "Static Malware Detection." In Intelligent Mobile Malware Detection, 23–42. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003121510-3.
Full textThomas, Tony, Roopak Surendran, Teenu S. John, and Mamoun Alazab. "System Call Pattern-Based Detection." In Intelligent Mobile Malware Detection, 103–14. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003121510-8.
Full textThomas, Tony, Roopak Surendran, Teenu S. John, and Mamoun Alazab. "Graph Convolutional Network for Detection." In Intelligent Mobile Malware Detection, 79–90. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003121510-6.
Full textThomas, Tony, Roopak Surendran, Teenu S. John, and Mamoun Alazab. "Internet and Android OS." In Intelligent Mobile Malware Detection, 1–12. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003121510-1.
Full textThomas, Tony, Roopak Surendran, Teenu S. John, and Mamoun Alazab. "Graph Signal Processing-Based Detection." In Intelligent Mobile Malware Detection, 91–102. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003121510-7.
Full textThomas, Tony, Roopak Surendran, Teenu S. John, and Mamoun Alazab. "Dynamic and Hybrid Malware Detection." In Intelligent Mobile Malware Detection, 43–68. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003121510-4.
Full textThomas, Tony, Roopak Surendran, Teenu S. John, and Mamoun Alazab. "Conclusions and Future Directions." In Intelligent Mobile Malware Detection, 115–18. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003121510-9.
Full textThomas, Tony, Roopak Surendran, Teenu S. John, and Mamoun Alazab. "Detection Using Graph Centrality Measures." In Intelligent Mobile Malware Detection, 69–78. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003121510-5.
Full textMartin, George, Dona Spencer, Aditya Hair, Deepa K, Sonia Laudanna, Vinod P, and Corrado Aaron Visaggio. "Mobile Malware Detection Using Consortium Blockchain." In Advances in Information Security, 137–60. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97087-1_6.
Full textConference papers on the topic "Mobile malware detection"
Shabtai, Asaf. "Malware Detection on Mobile Devices." In 2010 Eleventh International Conference on Mobile Data Management. IEEE, 2010. http://dx.doi.org/10.1109/mdm.2010.28.
Full textYoon, Seungyong, Jeongnyeo Kim, and Hyunsook Cho. "Detection of SMS mobile malware." In 2014 International Conference on Electronics, Information and Communications (ICEIC). IEEE, 2014. http://dx.doi.org/10.1109/elinfocom.2014.6914392.
Full textShahpasand, Maryam, Len Hamey, Dinusha Vatsalan, and Minhui Xue. "Adversarial Attacks on Mobile Malware Detection." In 2019 IEEE 1st International Workshop on Artificial Intelligence for Mobile (AI4Mobile). IEEE, 2019. http://dx.doi.org/10.1109/ai4mobile.2019.8672711.
Full textChen, Sen, Minhui Xue, and Lihua Xu. "Towards adversarial detection of mobile malware." In MobiCom'16: The 22nd Annual International Conference on Mobile Computing and Networking. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2973750.2985246.
Full textJin, Xiang, Xiaofei Xing, Haroon Elahi, Guojun Wang, and Hai Jiang. "A Malware Detection Approach Using Malware Images and Autoencoders." In 2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS). IEEE, 2020. http://dx.doi.org/10.1109/mass50613.2020.00009.
Full textLiu, Peishun, and Xuefang Wang. "Inductive Learning in Malware Detection." In 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2008. http://dx.doi.org/10.1109/wicom.2008.2921.
Full textSkovoroda, Anastasia, and Dennis Gamayunov. "Review of the Mobile Malware Detection Approaches." In 2015 23rd Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). IEEE, 2015. http://dx.doi.org/10.1109/pdp.2015.54.
Full textDai, Shuaifu, Yaxin Liu, Tielei Wang, Tao Wei, and Wei Zou. "Behavior-Based Malware Detection on Mobile Phone." In 2010 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2010. http://dx.doi.org/10.1109/wicom.2010.5601291.
Full textKhatri, Vikramajeet, and Joerg Abendroth. "Mobile Guard Demo: Network Based Malware Detection." In 2015 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2015. http://dx.doi.org/10.1109/trustcom.2015.501.
Full textBulut, Irfan, and A. Gokhan Yavuz. "Mobile malware detection using deep neural network." In 2017 25th Signal Processing and Communications Applications Conference (SIU). IEEE, 2017. http://dx.doi.org/10.1109/siu.2017.7960568.
Full text