2020
DOI: 10.1007/s00521-020-05429-x
|View full text |Cite
|
Sign up to set email alerts
|

A deep learning system for health care IoT and smartphone malware detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
24
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(25 citation statements)
references
References 31 publications
0
24
0
Order By: Relevance
“…(ey extract 178 features and rank them using InfoGain to select the top 120 of them for experiments. Other research articles that focused on android malware detection include [88][89][90][91][92][93][94][95][96][97][98][99].…”
Section: Android Malware Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…(ey extract 178 features and rank them using InfoGain to select the top 120 of them for experiments. Other research articles that focused on android malware detection include [88][89][90][91][92][93][94][95][96][97][98][99].…”
Section: Android Malware Detectionmentioning
confidence: 99%
“…CNN [47,112,52,62,36,68,89,77,35,46,56,80,84,70,92,27,51,121,87,34,54,50,76,95,29,100,82,83,114,42,57,79,40,74,63,73,66,26,39,30,119,101,110,61,32,65,120 quality of dataset should be carefully considered when creating and developing predictive models and tools for malware detection [148]. Such datasets are created by the research community to serve as a source of research for empirical analysis and extracting new insights about apps.…”
Section: Algorithmsmentioning
confidence: 99%
“…DL-based feature detection was proposed in [ 1 ], which was designed with the prime objective of detecting malware, and the application’s behavioral analysis was also done using different classifiers. Moreover, the features that were learned by the detecting system were also found to be reused, so that learning was also transferred towards efficient detection of malware, therefore contributing to accuracy.…”
Section: Introductionmentioning
confidence: 99%
“…Similarly, the Internet of ings (IoT) devices built on different processor architectures have increasingly become targets of adversarial attacks. Although there are many ways to detect malware on the Internet of ings [2,3], we still need to make further efforts in this field.…”
Section: Introductionmentioning
confidence: 99%