2018 IEEE International Conference on Computer and Communication Engineering Technology (CCET) 2018
DOI: 10.1109/ccet.2018.8542215
|View full text |Cite
|
Sign up to set email alerts
|

A Two-Layered Malware Detection Model Based on Permission for Android

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 6 publications
0
11
0
Order By: Relevance
“…Then the approach is used Rules for sensitive authorization, to analyse this detection mechanism and validate the efficacy of the system, a number of assessment approaches have been applied. Utilized to assess the method of detection and to validate the system's efficacy [83]. DAMBA, a novel prototype system based on C/S architecture, is presented in their article.…”
Section: Fig 2 Architecture Of Droid Deep [73]mentioning
confidence: 99%
“…Then the approach is used Rules for sensitive authorization, to analyse this detection mechanism and validate the efficacy of the system, a number of assessment approaches have been applied. Utilized to assess the method of detection and to validate the system's efficacy [83]. DAMBA, a novel prototype system based on C/S architecture, is presented in their article.…”
Section: Fig 2 Architecture Of Droid Deep [73]mentioning
confidence: 99%
“…They provided numerous optimization ideas for hybrid analysis to achieve improved efficiency and precision in their papers. The complicated computation work of the PC customer was finished to maintain the limited resources of the mobile customer [102].Cloak & Dagger, a specific kind of assaulting action, is detailed in length. Detection algorithm for harmful software packages, The Cloak and Dagger attack algorithm is presented for the detection of malicious software packages.…”
Section: Fig 2 Architecture Of Droid Deep [57]mentioning
confidence: 99%
“…In order to train the pre-processed sequences DexCNN can achieve accuracy of 93.4 percent, while the DexCRNN can reach accuracy of 95.8 per cent. [102] Utilized to assess the method of detection and to validate the system's efficacy.…”
Section: Dexcrnnmentioning
confidence: 99%
“…The anomaly detection is the model of intrusion detection mode with negligible false positives in the industrial process. Lu and Hou [10] described the model of android malware detection in order to detect the android malware effectively. This model is based on the declared permission.…”
Section: Literature Reviewmentioning
confidence: 99%