2018
DOI: 10.1016/j.datak.2018.03.002
|View full text |Cite
|
Sign up to set email alerts
|

A heuristics approach to mine behavioural data logs in mobile malware detection system

Abstract: Nowadays, in the era of every "things" connect together via the Internet, mobile device number has increased exponentially up to tens billions around the world. In line with this equipment increase, generated data amount is enormous and have attracted malefactors to spoil. For hackers, one of the popular ways to threaten mobile devices is to spread malware, which is very difficult to prevent because the application installation and configuration rights are set by owners, who usually have very low knowledge or … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
3

Relationship

2
8

Authors

Journals

citations
Cited by 30 publications
(16 citation statements)
references
References 20 publications
0
16
0
Order By: Relevance
“…At the first sight, general audience relates Big Data processing with distributed platforms like Apache Hadoop and Spark. The contiguity goes there for Volume in conformity with Veracity characteristic (Nguyen et al 2018) as well as high-speeds in processing and inference in background. In the new era of Big Data, data analysis is expected to change.…”
Section: Introductionmentioning
confidence: 70%
“…At the first sight, general audience relates Big Data processing with distributed platforms like Apache Hadoop and Spark. The contiguity goes there for Volume in conformity with Veracity characteristic (Nguyen et al 2018) as well as high-speeds in processing and inference in background. In the new era of Big Data, data analysis is expected to change.…”
Section: Introductionmentioning
confidence: 70%
“…Heuristic algorithms are often used for optimization problems based on several assumptions, such as knowledge inside a concrete domain [19]. Meta-heuristic algorithms are more domain-independent, and often operate based on probabilistic rules rather than deterministic ones.…”
Section: Background and Related Work A Optimization And Meta-heumentioning
confidence: 99%
“…Among them seven were proposing a general approach, or an architecture, to ascend the three levels of situation awareness, but none of them was tackling more than the volume of Big Data. This concerns Avvenuti et al (2018), who analyse social media data; Wu et al (2018), who propose a security situational awareness; Nguyen et al (2018), who detect malware intrusions automatically; Hingant et al (2018), who propose to critical important inherited from the perception step Figure 2. The proposed framework to support the design of a new emergency decision support system, able to connect to diverse, external, data sources, in order to improve their users' situation awareness.…”
Section: Definition Of the Papermentioning
confidence: 99%