2021
DOI: 10.1080/09540091.2021.1889977
|View full text |Cite
|
Sign up to set email alerts
|

Effective classification of android malware families through dynamic features and neural networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
3

Relationship

1
9

Authors

Journals

citations
Cited by 35 publications
(10 citation statements)
references
References 35 publications
0
10
0
Order By: Relevance
“…It provided an acceptable remedy for the virus recognition dispute. Unpacking and run‐time characteristics, such as network flows, hash fingerprints, permissions, metadata, and API calls, were used by D'Angelo et al (2021) to characterize the idiosyncrasies of the software's behaviour. In order to investigate how to employ deep learning in malware detection, Rathore et al (2022) suggested an image‐based malware detection system.…”
Section: Related Literaturementioning
confidence: 99%
“…It provided an acceptable remedy for the virus recognition dispute. Unpacking and run‐time characteristics, such as network flows, hash fingerprints, permissions, metadata, and API calls, were used by D'Angelo et al (2021) to characterize the idiosyncrasies of the software's behaviour. In order to investigate how to employ deep learning in malware detection, Rathore et al (2022) suggested an image‐based malware detection system.…”
Section: Related Literaturementioning
confidence: 99%
“…Finally, in 2021, D'Angelo et al [12] proposed a CNN and a recurrent neural network (RNN), based on API-images, in order to classify different malware families. More precisely, they used both neural networks on five malware families on the Unisa malware dataset (UMD) by achieving 99% in average accuracy.…”
Section: Related Workmentioning
confidence: 99%
“…The increased occurrences of cyberattacks are a direct result of phenomenal growth and the development of IoT gadgets in these fields in terms of smart manufacturing, smart grids, patient monitoring systems, logistics and environmental monitoring. It is challenging to accomplish the security management of IoT networks due to the transient and dynamic nature of the links among the devices, the diversity of the players who can interact with IoT networks and resource limitations [3]. The global IoT security market is anticipated to expand at an Annual Growth Rate of 33.7%, owing to multiple factors such as a high number of cyberattacks on IoT gadgets, heavy regulations on IoT security and an increased number of security concerns [4].…”
Section: Introductionmentioning
confidence: 99%