Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2021
DOI: 10.1080/08839514.2021.2007327
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Overview of Android Malware Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(16 citation statements)
references
References 110 publications
0
10
0
Order By: Relevance
“…The uses of such techniques are presented as follows: The SVM classification approach looks for unusual behavior in IoT devices and malware on Android to assure the dependability of IoT services [ 106 ]. Anomalies, denial-of-service assaults, IoT intrusions, and irregularities in smart cities are all detected using the random forest approach [ 107 ]. Two other methods for detecting abnormalities include a Naive-Bayes-based classification model and a linear-regression-based strategy for spotting malicious IoT malicious nodes [ 108 ].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The uses of such techniques are presented as follows: The SVM classification approach looks for unusual behavior in IoT devices and malware on Android to assure the dependability of IoT services [ 106 ]. Anomalies, denial-of-service assaults, IoT intrusions, and irregularities in smart cities are all detected using the random forest approach [ 107 ]. Two other methods for detecting abnormalities include a Naive-Bayes-based classification model and a linear-regression-based strategy for spotting malicious IoT malicious nodes [ 108 ].…”
Section: Resultsmentioning
confidence: 99%
“…Anomalies, denial-of-service assaults, IoT intrusions, and irregularities in smart cities are all detected using the random forest approach [ 107 ].…”
Section: Resultsmentioning
confidence: 99%
“…In the context of malware classification, it has been observed that machine learning‐based Android detectors face sustainability challenges. These detectors typically undergo performance degradation due to the Android ecosystem's constant development and the emergence of novel malware types (Meijin et al, 2022). In the research domain, researchers (Kantchelian et al, 2013) have repeatedly retrained the malware classification model to address this issue.…”
Section: Related Workmentioning
confidence: 99%
“…The feature extraction techniques include data cleaning, transformation, reduction, and discretization. Data cleaning: Following acquiring the initial data using feature extraction, data cleaning involves eliminating irrelevant properties. For instance, this process addresses the elimination of inconsequential permissions present in benign and malicious Android applications (Meijin et al, 2022). Data transformation: Data transformation encompasses data conversion from one format to another.…”
Section: Android Malware Detection Modelmentioning
confidence: 99%
See 1 more Smart Citation