2017
DOI: 10.1007/s00521-017-2914-y
|View full text |Cite
|
Sign up to set email alerts
|

HEMD: a highly efficient random forest-based malware detection framework for Android

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
30
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 58 publications
(32 citation statements)
references
References 34 publications
1
30
0
1
Order By: Relevance
“…3.3, with the analysis of the predictive performance. Specifically, the selected feature subsets have been used to train both support vector machines (SVM) and random forest (RF) classifiers, which have proved to be ''best of class'' learners in several domains [66][67][68][69]. In particular, for the SVM classifier we use a linear kernel, while the RF classifier is parameterized based on common practice in the literature [70,71] (log 2 (th) ?…”
Section: Predictive Performance Analysismentioning
confidence: 99%
“…3.3, with the analysis of the predictive performance. Specifically, the selected feature subsets have been used to train both support vector machines (SVM) and random forest (RF) classifiers, which have proved to be ''best of class'' learners in several domains [66][67][68][69]. In particular, for the SVM classifier we use a linear kernel, while the RF classifier is parameterized based on common practice in the literature [70,71] (log 2 (th) ?…”
Section: Predictive Performance Analysismentioning
confidence: 99%
“…If the expressions and constraints of an application are in this rule library, this application will be considered as a malicious application. For example, to reduce the high false- [15], [16], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [60], [61], [62], [63], [64], [94], [95], [98], [99], [100], [101], [102], [105], [109], [111],…”
Section: ) Publication Sourcementioning
confidence: 99%
“…In [40], the authors presented the ‗AdDroid model' that detects malicious activities on a device by analyzing Android actions such as uploading of a file to a server, internet connections, installing packages on the device, etc. In [41], Android malware was detected by observing run-time-related events along with sensitive APIs and permissions by Zhu et al Apart from this, the authors in [42] and [43] proposed two absolutely different hybrid detection techniques by merging and combining the permissions with network traffic features. On similar lines, the authors in [44], [45], and [46] worked on malware detection by analyzing the combination of static and dynamic features.…”
Section: Hybrid Detectionmentioning
confidence: 99%