2014 International Conference on Machine Learning and Cybernetics 2014
DOI: 10.1109/icmlc.2014.7009096
|View full text |Cite
|
Sign up to set email alerts
|

Static detection of Android malware by using permissions and API calls

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0
3

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 73 publications
(39 citation statements)
references
References 10 publications
0
36
0
3
Order By: Relevance
“…In [17], API classes were used with Random Forest, J48 and SVM classifiers. Wang et al [18] evaluated the usefulness of risky permissions for malware detection using SVM, Decision Trees and Random Forest.…”
Section: A Static Analysis With Traditional Classifiersmentioning
confidence: 99%
“…In [17], API classes were used with Random Forest, J48 and SVM classifiers. Wang et al [18] evaluated the usefulness of risky permissions for malware detection using SVM, Decision Trees and Random Forest.…”
Section: A Static Analysis With Traditional Classifiersmentioning
confidence: 99%
“…Five machine learning classifiers were used in the dataset, which are Naïve Bayes (NB), K-Nearest Neighbors (KNN) Decision Tree (J48), Random Forest (RF) and Support Vector Machine (SVM) with SMO. These five classifiers were chosen due to their common use in other similar works [26,[37][38][39]. The experiment was conducted by using Waikato Environment for Knowledge Analysis (WEKA), which is a software tool that was widely employed for implementing the feature selection method and the classification algorithm [36].…”
Section: R 2 R 3 …R J } and If J Th Permission Exist (1) Otherwisementioning
confidence: 99%
“…By recording system call patterns of malware and benign, a Boolean feature set can be created to build Android malware classification system [34], [43]- [47].…”
Section: System Callsmentioning
confidence: 99%