Journal articles on the topic 'Mobile malware detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Mobile malware detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yildiz, Oktay, and Ibrahim Alper Doğru. "Permission-based Android Malware Detection System Using Feature Selection with Genetic Algorithm." International Journal of Software Engineering and Knowledge Engineering 29, no. 02 (February 2019): 245–62. http://dx.doi.org/10.1142/s0218194019500116.
Full textSwetha, K., and K. V.D.Kiran. "Survey on Mobile Malware Analysis and Detection." International Journal of Engineering & Technology 7, no. 2.32 (May 31, 2018): 279. http://dx.doi.org/10.14419/ijet.v7i2.32.15584.
Full textJang, Jae-wook, and Huy Kang Kim. "Function-Oriented Mobile Malware Analysis as First Aid." Mobile Information Systems 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/6707524.
Full textM., Duraipandian, and Vinothkanna R. "MACHINE LEARNING BASED AUTOMATIC PERMISSION GRANTING AND MALWARE IDENTIFICATION." December 2019 01, no. 02 (December 23, 2019): 96–107. http://dx.doi.org/10.36548/jitdw.2019.2.005.
Full textBibi, Iram, Adnan Akhunzada, Jahanzaib Malik, Muhammad Khurram Khan, and Muhammad Dawood. "Secure Distributed Mobile Volunteer Computing with Android." ACM Transactions on Internet Technology 22, no. 1 (February 28, 2022): 1–21. http://dx.doi.org/10.1145/3428151.
Full textDu, Yao, Mengtian Cui, and Xiaochun Cheng. "A Mobile Malware Detection Method Based on Malicious Subgraphs Mining." Security and Communication Networks 2021 (April 17, 2021): 1–11. http://dx.doi.org/10.1155/2021/5593178.
Full textHe, Gaofeng, Bingfeng Xu, Lu Zhang, and Haiting Zhu. "On-Device Detection of Repackaged Android Malware via Traffic Clustering." Security and Communication Networks 2020 (May 31, 2020): 1–19. http://dx.doi.org/10.1155/2020/8630748.
Full textMazaed Alotaibi, Fahad, and Fawad. "A Multifaceted Deep Generative Adversarial Networks Model for Mobile Malware Detection." Applied Sciences 12, no. 19 (September 20, 2022): 9403. http://dx.doi.org/10.3390/app12199403.
Full textRahul Y. Pawar, Mr, and Dr C.Mahesh. "A Survey on Malware Detection Techniques on Linux Powered Smart Phones using Machine Learning Approaches." International Journal of Engineering & Technology 7, no. 3.34 (September 1, 2018): 8. http://dx.doi.org/10.14419/ijet.v7i3.34.18706.
Full textGuo, Dai Fei, Jian Jun Hu, Ai Fen Sui, Guan Zhou Lin, and Tao Guo. "The Abnormal Mobile Malware Analysis Based on Behavior Categorization." Advanced Materials Research 765-767 (September 2013): 994–97. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.994.
Full textAboshady, Doaa, Naglaa Ghannam, Eman Elsayed, and Lamiaa Diab. "The Malware Detection Approach in the Design of Mobile Applications." Symmetry 14, no. 5 (April 19, 2022): 839. http://dx.doi.org/10.3390/sym14050839.
Full textEgitmen, Alper, Irfan Bulut, R. Can Aygun, A. Bilge Gunduz, Omer Seyrekbasan, and A. Gokhan Yavuz. "Combat Mobile Evasive Malware via Skip-Gram-Based Malware Detection." Security and Communication Networks 2020 (April 20, 2020): 1–10. http://dx.doi.org/10.1155/2020/6726147.
Full textKo, Eunbyeol, Jinsung Kim, Younghoon Ban, Haehyun Cho, and Jeong Hyun Yi. "ACAMA: Deep Learning-Based Detection and Classification of Android Malware Using API-Based Features." Security and Communication Networks 2021 (December 29, 2021): 1–12. http://dx.doi.org/10.1155/2021/6330828.
Full textAkintola, Abimbola G., Abdullateef O. Balogun, Luiz Fernando Capretz, Hammed A. Mojeed, Shuib Basri, Shakirat A. Salihu, Fatima E. Usman-Hamza, Peter O. Sadiku, Ghaniyyat B. Balogun, and Zubair O. Alanamu. "Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection." Applied Sciences 12, no. 9 (May 6, 2022): 4664. http://dx.doi.org/10.3390/app12094664.
Full textParajuli, Srijana, and Subarna Shakya. "Malware Detection and Classification Using Latent Semantic Indexing." Journal of Advanced College of Engineering and Management 4 (December 31, 2018): 153–61. http://dx.doi.org/10.3126/jacem.v4i0.23205.
Full textD, BalaGanesh, Amlan Chakrabarti, and Divya Midhunchakkaravarthy. "Smart Devices Threats, Vulnerabilities and Malware Detection Approaches: A Survey." European Journal of Engineering Research and Science 3, no. 2 (February 6, 2018): 7. http://dx.doi.org/10.24018/ejers.2018.3.2.302.
Full textD, BalaGanesh, Amlan Chakrabarti, and Divya Midhunchakkaravarthy. "Smart Devices Threats, Vulnerabilities and Malware Detection Approaches: A Survey." European Journal of Engineering and Technology Research 3, no. 2 (February 6, 2018): 7–12. http://dx.doi.org/10.24018/ejeng.2018.3.2.302.
Full textSusanto, Susanto, M. Agus Syamsul Arifin, Deris Stiawan, Mohd Yazid Idris, and Rahmat Budiarto. "The trend malware source of IoT network." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (April 1, 2021): 450. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp450-459.
Full textLakshmanarao, A., and M. Shashi. "Android Malware Detection with Deep Learning using RNN from Opcode Sequences." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 01 (January 18, 2022): 145–57. http://dx.doi.org/10.3991/ijim.v16i01.26433.
Full textAmro, Belal. "Malware Detection Techniques for Mobile Devices." International Journal of Mobile Network Communications & Telematics 7, no. 4/5/6 (December 30, 2017): 01–10. http://dx.doi.org/10.5121/ijmnct.2017.7601.
Full textVenugopal, Deepak, and Guoning Hu. "Efficient Signature Based Malware Detection on Mobile Devices." Mobile Information Systems 4, no. 1 (2008): 33–49. http://dx.doi.org/10.1155/2008/712353.
Full textZou, Deqing, Yueming Wu, Siru Yang, Anki Chauhan, Wei Yang, Jiangying Zhong, Shihan Dou, and Hai Jin. "IntDroid." ACM Transactions on Software Engineering and Methodology 30, no. 3 (May 2021): 1–32. http://dx.doi.org/10.1145/3442588.
Full textAshawa, Moses, and Sarah Morris. "Analysis of Mobile Malware: A Systematic Review of Evolution and Infection Strategies." Journal of Information Security and Cybercrimes Research 4, no. 2 (December 30, 2021): 103–31. http://dx.doi.org/10.26735/krvi8434.
Full textWang, Liu, Haoyu Wang, Ren He, Ran Tao, Guozhu Meng, Xiapu Luo, and Xuanzhe Liu. "MalRadar." Proceedings of the ACM on Measurement and Analysis of Computing Systems 6, no. 2 (May 26, 2022): 1–27. http://dx.doi.org/10.1145/3530906.
Full textWang, Liu, Haoyu Wang, Ren He, Ran Tao, Guozhu Meng, Xiapu Luo, and Xuanzhe Liu. "MalRadar." Proceedings of the ACM on Measurement and Analysis of Computing Systems 6, no. 2 (May 26, 2022): 1–27. http://dx.doi.org/10.1145/3530906.
Full textYan, Jinpei, Yong Qi, and Qifan Rao. "LSTM-Based Hierarchical Denoising Network for Android Malware Detection." Security and Communication Networks 2018 (2018): 1–18. http://dx.doi.org/10.1155/2018/5249190.
Full textWang, Chao, Zhizhong Wu, Xi Li, Xuehai Zhou, Aili Wang, and Patrick C. K. Hung. "SmartMal: A Service-Oriented Behavioral Malware Detection Framework for Mobile Devices." Scientific World Journal 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/101986.
Full textBai, Huiwen, Guangjie Liu, Weiwei Liu, Yingxue Quan, and Shuhua Huang. "N-Gram, Semantic-Based Neural Network for Mobile Malware Network Traffic Detection." Security and Communication Networks 2021 (April 23, 2021): 1–17. http://dx.doi.org/10.1155/2021/5599556.
Full textYe, Genchao, Jian Zhang, Huanzhou Li, Zhangguo Tang, and Tianzi Lv. "Android Malware Detection Technology Based on Lightweight Convolutional Neural Networks." Security and Communication Networks 2022 (March 16, 2022): 1–12. http://dx.doi.org/10.1155/2022/8893764.
Full textKOULIARIDIS, Vasileios, Konstantia BARMPATSALOU, Georgios KAMBOURAKIS, and Shuhong CHEN. "A Survey on Mobile Malware Detection Techniques." IEICE Transactions on Information and Systems E103.D, no. 2 (February 1, 2020): 204–11. http://dx.doi.org/10.1587/transinf.2019ini0003.
Full textLysenko, Sergii, Kira Bobrovnikova, Andrii Nicheporuk, and Roman Shchuka. "SVM-based Technique for Mobile Malware Detection." Computer Modeling and Intelligent Systems 2353 (2019): 85–97. http://dx.doi.org/10.32782/cmis/2353-7.
Full textMohamad Arif, Juliza, Mohd Faizal Ab Razak, Sharfah Ratibah Tuan Mat, Suryanti Awang, Nor Syahidatul Nadiah Ismail, and Ahmad Firdaus. "Android mobile malware detection using fuzzy AHP." Journal of Information Security and Applications 61 (September 2021): 102929. http://dx.doi.org/10.1016/j.jisa.2021.102929.
Full textChandramohan, Mahinthan, and Hee Beng Kuan Tan. "Detection of Mobile Malware in the Wild." Computer 45, no. 9 (September 2012): 65–71. http://dx.doi.org/10.1109/mc.2012.36.
Full textYan, Ping, and Zheng Yan. "A survey on dynamic mobile malware detection." Software Quality Journal 26, no. 3 (May 13, 2017): 891–919. http://dx.doi.org/10.1007/s11219-017-9368-4.
Full textKhatter, Kiran, and Sapna Malik. "Ranking and Risk Factor Scheme for Malicious applications detection and Classifications." International Journal of Information System Modeling and Design 9, no. 3 (July 2018): 67–84. http://dx.doi.org/10.4018/ijismd.2018070104.
Full textNamrud, Zakeya, Sègla Kpodjedo, Chamseddine Talhi, Ahmed Bali, and Alvine Boaye Belle. "Deep Learning Based Android Anomaly Detection Using a Combination of Vulnerabilities Dataset." Applied Sciences 11, no. 16 (August 17, 2021): 7538. http://dx.doi.org/10.3390/app11167538.
Full textLiu, Yanbing, Shousheng Jia, and Congcong Xing. "A Novel Behavior-Based Virus Detection Method for Smart Mobile Terminals." Discrete Dynamics in Nature and Society 2012 (2012): 1–12. http://dx.doi.org/10.1155/2012/262193.
Full textMaryam, Afifa, Usman Ahmed, Muhammad Aleem, Jerry Chun-Wei Lin, Muhammad Arshad Islam, and Muhammad Azhar Iqbal. "cHybriDroid: A Machine Learning-Based Hybrid Technique for Securing the Edge Computing." Security and Communication Networks 2020 (November 27, 2020): 1–14. http://dx.doi.org/10.1155/2020/8861639.
Full textMercaldo, Francesco, Giovanni Ciaramella, Giacomo Iadarola, Marco Storto, Fabio Martinelli, and Antonella Santone. "Towards Explainable Quantum Machine Learning for Mobile Malware Detection and Classification." Applied Sciences 12, no. 23 (November 24, 2022): 12025. http://dx.doi.org/10.3390/app122312025.
Full textFournier, Arthur, Franjieh El Khoury, and Samuel Pierre. "A Client/Server Malware Detection Model Based on Machine Learning for Android Devices." IoT 2, no. 3 (June 24, 2021): 355–74. http://dx.doi.org/10.3390/iot2030019.
Full textWang, Liu, Haoyu Wang, Ren He, Ran Tao, Guozhu Meng, Xiapu Luo, and Xuanzhe Liu. "MalRadar." ACM SIGMETRICS Performance Evaluation Review 50, no. 1 (June 20, 2022): 21–22. http://dx.doi.org/10.1145/3547353.3530973.
Full textGupta, Siddhant, Siddharth Sethi, Srishti Chaudhary, and Anshul Arora. "Blockchain Based Detection of Android Malware using Ranked Permissions." International Journal of Engineering and Advanced Technology 10, no. 5 (June 30, 2021): 68–75. http://dx.doi.org/10.35940/ijeat.e2593.0610521.
Full textSenanayake, Janaka, Harsha Kalutarage, and Mhd Omar Al-Kadri. "Android Mobile Malware Detection Using Machine Learning: A Systematic Review." Electronics 10, no. 13 (July 5, 2021): 1606. http://dx.doi.org/10.3390/electronics10131606.
Full textAl Huda, Fais, Wayan Firdaus Mahmudy, and Herman Tolle. "Android Malware Detection Using Backpropagation Neural Network." Indonesian Journal of Electrical Engineering and Computer Science 4, no. 1 (October 1, 2016): 240. http://dx.doi.org/10.11591/ijeecs.v4.i1.pp240-244.
Full textKouliaridis, Vasileios, and Georgios Kambourakis. "A Comprehensive Survey on Machine Learning Techniques for Android Malware Detection." Information 12, no. 5 (April 25, 2021): 185. http://dx.doi.org/10.3390/info12050185.
Full textLiu, Tianyue, Zhenwan Li, Haixia Long, and Anas Bilal. "NT-GNN: Network Traffic Graph for 5G Mobile IoT Android Malware Detection." Electronics 12, no. 4 (February 4, 2023): 789. http://dx.doi.org/10.3390/electronics12040789.
Full textMalik, Sapna, and Kiran Khatter. "Malicious Application Detection and Classification System for Android Mobiles." International Journal of Ambient Computing and Intelligence 9, no. 1 (January 2018): 95–114. http://dx.doi.org/10.4018/ijaci.2018010106.
Full textVishnoi, Aayush, Preeti Mishra, Charu Negi, and Sateesh Kumar Peddoju. "Android Malware Detection Techniques in Traditional and Cloud Computing Platforms." International Journal of Cloud Applications and Computing 11, no. 4 (October 2021): 113–35. http://dx.doi.org/10.4018/ijcac.2021100107.
Full textEt.al, Shafiu Musa. "HEFESTDROID: Highly Effective Features for Android Malware Detection and Analysis." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 10, 2021): 4676–82. http://dx.doi.org/10.17762/turcomat.v12i3.1884.
Full textYuniati, Trihastuti, Aris Rafael Tambunan, and Yoso Adi Setyoko. "Implementasi Static Analysis Dan Background Process Untuk Mendeteksi Malware Pada Aplikasi Android Dengan Mobile Security Framework." LEDGER : Journal Informatic and Information Technology 1, no. 2 (October 18, 2022): 24–28. http://dx.doi.org/10.20895/ledger.v1i2.848.
Full text