2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA) 2015
DOI: 10.1109/icmla.2015.72
|View full text |Cite
|
Sign up to set email alerts
|

Malware Detection in Android-Based Mobile Environments Using Optimum-Path Forest

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 24 publications
0
6
0
Order By: Relevance
“…Some work [12], [13], [15], [16], [17] considered action as features in Malicious application recognition. Shao [12] removed the number of exercises and different features to identify malignant applications.…”
Section: App Componentmentioning
confidence: 99%
See 1 more Smart Citation
“…Some work [12], [13], [15], [16], [17] considered action as features in Malicious application recognition. Shao [12] removed the number of exercises and different features to identify malignant applications.…”
Section: App Componentmentioning
confidence: 99%
“…Shao [12] removed the number of exercises and different features to identify malignant applications. Studies [13], [15], [17] further applied assistance and broadcast beneficiaries as features in malicious application discovery. Feldman et al [18] picked the recurrence of highly need recipients and manhandled administrations to recognize malicious applications.…”
Section: App Componentmentioning
confidence: 99%
“…The reason for this technique was to check whether the applications exceeded their normal dangers. Some studies (Wermke et al, 2019;Faruki et al, 2013;Zhao et al, 2016;Yang et al, 2014;Suarez-Tangil et al, 2017;Chen et al, 2014;Nath and Mehtre, 2014;Avdiienko et al, 2015;da Costa et al, 2016;Saracino et al, 2018;Vidas et al, 2014;Feldman et al, 2015;Wu et al, 2016;Lindorfer et al, 2015;Chen et al, 2017;Yang et al, 2014;Cen et al, 2015;Zhu et al, 2016;Idrees et al, 2017;Dam and Touili, 2017;Chen et al, 2016;Leeds et al, 2017;Lin et al, 2017) brought permissions just as some different features and used ML ways to deal with recognize malicious applications. This methodology-accomplished precision as over 94% (Wei et al, 2019), Because applying permission security is critical for attackers to achieve their hacking goals, permission is the most commonly used static feature in Android.…”
Section: Permissionmentioning
confidence: 99%
“…The four major components of an Android application are Activity, Service, Broadcast Receiver, and Content Provider (Wei et al, 2019). Some work (Chen et al, 2014;Nath and Mehtre, 2014;Avdiienko et al, 2015;da Costa et al, 2016;Saracino et al, 2018;Vidas et al, 2014) considered action as features in Malicious application recognition. (Chen et al, 2014) removed the number of exercises and different features to identify malignant applications.…”
Section: App Componentmentioning
confidence: 99%
“…Their results conclude that there is a promising path with the use of RBMs in learning such characteristics. Another interesting work was proposed by Costa et al [17], which concerns the analysis using unsupervised learning of features in the context of mobile malware detection. This work, however, adopts a new approach, attaching quaternions in the learning process, in order the reach better results.…”
Section: Introductionmentioning
confidence: 99%