DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network
暂无分享,去创建一个
Abdul Rehman Javed | Zunera Jalil | Xuan Liu | Waleed S. Alnumay | Saif ur Rehman | A. R. Javed | Syed Ibrahim Imtiaz | Z. Jalil | S. Rehman | Xuan Liu
[1] Rong Chen,et al. Android Malware Identification Based on Traffic Analysis , 2019, ICAIS.
[2] Patrick P. K. Chan,et al. Static detection of Android malware by using permissions and API calls , 2014, 2014 International Conference on Machine Learning and Cybernetics.
[3] Assaf Neuberger,et al. Adware detection and privacy control in mobile devices , 2014, 2014 IEEE 28th Convention of Electrical & Electronics Engineers in Israel (IEEEI).
[4] Jin Kwak,et al. Real Time Android Ransomware Detection by Analyzed Android Applications , 2019, 2019 International Conference on Electronics, Information, and Communication (ICEIC).
[5] Franklin Tchakounté,et al. Detection of Android Malware based on Sequence Alignment of Permissions , 2019 .
[6] Samanvay Gupta. Types of Malware and its Analysis , 2013 .
[7] B. B. Gupta,et al. Towards Privacy Risk Analysis in Android Applications Using Machine Learning Approaches , 2019, Int. J. E Serv. Mob. Appl..
[8] Ali Kashif Bashir,et al. Intelligent Reward-Based Data Offloading in Next-Generation Vehicular Networks , 2020, IEEE Internet of Things Journal.
[9] Ali Feizollah,et al. AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection , 2017, Comput. Secur..
[10] Arash Habibi Lashkari,et al. Extensible Android Malware Detection and Family Classification Using Network-Flows and API-Calls , 2019, 2019 International Carnahan Conference on Security Technology (ICCST).
[11] Kouichi Sakurai,et al. Detection of Android API Call Using Logging Mechanism within Android Framework , 2013, SecureComm.
[12] Gautam Srivastava,et al. KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks , 2020, IEEE Access.
[13] Win Zaw,et al. Permission-Based Android Malware Detection , 2013 .
[14] Pavol Zavarsky,et al. Experimental Analysis of Ransomware on Windows and Android Platforms: Evolution and Characterization , 2016, FNC/MobiSPC.
[15] El-Sayed M. El-Alfy,et al. Benchmarking Open-Source Android Malware Detection Tools , 2019, 2019 2nd IEEE Middle East and North Africa COMMunications Conference (MENACOMM).
[16] Thar Baker,et al. AlphaLogger: detecting motion-based side-channel attack using smartphone keystrokes , 2020, Journal of Ambient Intelligence and Humanized Computing.
[17] Anshul Arora,et al. Malware Detection Using Network Traffic Analysis in Android Based Mobile Devices , 2014, 2014 Eighth International Conference on Next Generation Mobile Apps, Services and Technologies.
[18] Zhenlong Yuan,et al. DroidDetector: Android Malware Characterization and Detection Using Deep Learning , 2016 .
[19] Khaled W. Mahmoud,et al. Android Malware Detection and Categorization Based on Conversation-level Network Traffic Features , 2019, 2019 International Arab Conference on Information Technology (ACIT).
[20] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[21] Celestine Iwendi,et al. Analyzing the Effectiveness and Contribution of Each Axis of Tri-Axial Accelerometer Sensor for Accurate Activity Recognition , 2020, Sensors.
[22] Andrew Honig,et al. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software , 2012 .
[23] Chun-Ying Huang,et al. Performance Evaluation on Permission-Based Detection for Android Malware , 2013 .
[24] Ali A. Ghorbani,et al. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.
[25] Ali A. Ghorbani,et al. Towards a Network-Based Framework for Android Malware Detection and Characterization , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).
[26] Tuan Nguyen,et al. Detecting sensitive data leakage via inter-applications on Android using a hybrid analysis technique , 2017, Cluster Computing.
[27] Emre Erturk. A case study in open source software security and privacy: Android adware , 2012, World Congress on Internet Security (WorldCIS-2012).
[28] Xiaojiang Du,et al. IoT malicious traffic identification using wrapper-based feature selection mechanisms , 2020, Comput. Secur..
[29] Hahn-Ming Lee,et al. DroidMat: Android Malware Detection through Manifest and API Calls Tracing , 2012, 2012 Seventh Asia Joint Conference on Information Security.
[30] Chao Wang,et al. Research on data mining of permissions mode for Android malware detection , 2018, Cluster Computing.
[31] Mahdi Abadi,et al. SMSBotHunter: A Novel Anomaly Detection Technique to Detect SMS Botnets , 2018, 2018 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC).
[32] Ali A. Ghorbani,et al. Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification , 2018, 2018 International Carnahan Conference on Security Technology (ICCST).
[33] Abdul Rehman Javed,et al. Ensemble Adaboost classifier for accurate and fast detection of botnet attacks in connected vehicles , 2020, Trans. Emerg. Telecommun. Technol..
[34] Fakhroddin Noorbehbahani,et al. Analysis of Machine Learning Techniques for Ransomware Detection , 2019, 2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC).
[35] Celestine Iwendi,et al. Analysis of security and energy efficiency for shortest route discovery in low‐energy adaptive clustering hierarchy protocol using Levenberg‐Marquardt neural network and gated recurrent unit for intrusion detection system , 2020, Trans. Emerg. Telecommun. Technol..
[36] Hein S. Venter,et al. Testing the harmonised digital forensic investigation process model-using an Android mobile phone , 2013, 2013 Information Security for South Africa.
[37] Jing Yu,et al. Access Control to Prevent Attacks Exploiting Vulnerabilities of WebView in Android OS , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.
[38] Ali Kashif Bashir,et al. PARCIV: Recognizing physical activities having complex interclass variations using semantic data of smartphone , 2020, Softw. Pract. Exp..
[39] Ahmed Raza Rajput,et al. A Survey on Smartphones Security: Software Vulnerabilities, Malware, and Attacks , 2020, ArXiv.
[40] Sanggeun Song,et al. The Effective Ransomware Prevention Technique Using Process Monitoring on Android Platform , 2016, Mob. Inf. Syst..
[41] Ayman I. Kayssi,et al. Android SMS Malware: Vulnerability and Mitigation , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.