2023
DOI: 10.32604/iasc.2023.030527
|View full text |Cite
|
Sign up to set email alerts
|

Investigation of Android Malware Using Deep Learning Approach

Abstract: In recent days the usage of android smartphones has increased extensively by end-users. There are several applications in different categories banking/finance, social engineering, education, sports and fitness, and many more applications. The android stack is more vulnerable compared to other mobile platforms like IOS, Windows, or Blackberry because of the open-source platform. In the Existing system, malware is written using vulnerable system calls to bypass signature detection important drawback is might not… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 25 publications
0
0
0
Order By: Relevance
“…The training is continued until the model masters accurately predict every sample [11]. Furthermore, the development of malware detection systems has made use of a variety of ML methods, including support vector machines (SVM) [12], K-nearest neighbor (KNN) [13], Bayesian estimation [9], genetic algorithms [14], etc. These ML algorithms are trained to discriminate between malicious and benign samples using unsupervised learning techniques that supply the inputs without goals [15].…”
Section: Introductionmentioning
confidence: 99%
“…The training is continued until the model masters accurately predict every sample [11]. Furthermore, the development of malware detection systems has made use of a variety of ML methods, including support vector machines (SVM) [12], K-nearest neighbor (KNN) [13], Bayesian estimation [9], genetic algorithms [14], etc. These ML algorithms are trained to discriminate between malicious and benign samples using unsupervised learning techniques that supply the inputs without goals [15].…”
Section: Introductionmentioning
confidence: 99%