2022
DOI: 10.1016/j.icte.2021.09.003
|View full text |Cite
|
Sign up to set email alerts
|

A Bayesian probability model for Android malware detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 37 publications
(14 citation statements)
references
References 19 publications
0
13
0
1
Order By: Relevance
“…These results are better than the KNN-based study by Arslan, Doğru & Barişçi (2019) . At the same time, it obtained better results than the Bayesian classifier-based study of Mat et al (2021) . Arslan (2021) achieved 98.16% accuracy in his DNN-based study.…”
Section: Resultsmentioning
confidence: 91%
See 2 more Smart Citations
“…These results are better than the KNN-based study by Arslan, Doğru & Barişçi (2019) . At the same time, it obtained better results than the Bayesian classifier-based study of Mat et al (2021) . Arslan (2021) achieved 98.16% accuracy in his DNN-based study.…”
Section: Resultsmentioning
confidence: 91%
“…The feature selection process was performed by applying the information gain and chi-square methods to the features they obtained. At the end of the study, they achieved 91.1% accuracy with the Naive Bayes method ( Mat et al, 2021 ).…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…A mobile malware detection system serves the purpose of identifying malicious software on mobile devices. Given the escalating integration of mobile devices into everyday activities and the escalating risk posed by malicious software, developing such a detection system holds immense importance [9,13]. The function of each component within the system is delineated as follows.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…Carefully, zero-day vulnerabilities and advanced malware are still being used, and attackers are deliberately covered up [5], [6]. The use of tools such as legal system management software and operating system features is simple: spear-phishing e-mails and "living out of the field" [3], [7].…”
Section: Introductionmentioning
confidence: 99%