The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS) 2017
DOI: 10.1109/icecds.2017.8390201
|View full text |Cite
|
Sign up to set email alerts
|

Identification of Botnet hidden behind smartphone applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…N/A. [197] Another point of interest in botnet detection is the detection of smartphone-based botnets. Some papers, such as Abdullah and Saudi [18], propose assessing the potential risk of malicious apps by evaluating the API calls used by given apps.…”
Section: Technique Advantage(s) Disadvantage(s) Detection Rate Papersmentioning
confidence: 99%
See 3 more Smart Citations
“…N/A. [197] Another point of interest in botnet detection is the detection of smartphone-based botnets. Some papers, such as Abdullah and Saudi [18], propose assessing the potential risk of malicious apps by evaluating the API calls used by given apps.…”
Section: Technique Advantage(s) Disadvantage(s) Detection Rate Papersmentioning
confidence: 99%
“…The data is then labelled using a machine learning algorithm to determine whether or not an app acts like a botnet. Reference [197] instead asks the user to specify trusted apps and what permissions a given app should have according to the user. Any apps performing unauthorised or suspicious actions are flagged, and the user is informed.…”
Section: Technique Advantage(s) Disadvantage(s) Detection Rate Papersmentioning
confidence: 99%
See 2 more Smart Citations