2013 International Conference on ICT Convergence (ICTC) 2013
DOI: 10.1109/ictc.2013.6675404
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Android malware detection performance using machine learning classifiers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
4
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 31 publications
(5 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Threats to mobile devices have expanded along with the usage of mobile banking, transactions, and e-commerce. As a result, mobile devices are becoming more prone to cyber-attacks than personal computers [94].…”
Section: Malware Detection By Using MLmentioning
confidence: 99%
“…Threats to mobile devices have expanded along with the usage of mobile banking, transactions, and e-commerce. As a result, mobile devices are becoming more prone to cyber-attacks than personal computers [94].…”
Section: Malware Detection By Using MLmentioning
confidence: 99%
“…Ham and Choi [4] have proposed a new feature set and used the same to detect malware by inputting the feature set to machine learning classifiers. The malware application also hides any acknowledgments transmitted by the telecom operator.…”
Section: Related Workmentioning
confidence: 99%
“…The graph supports our assumption by showing the signicant deviation in the CPU utilisation pattern during the DDoS attack period. In the literature we note works such as [21], [22], [2], [15], [9], [16], [17] where deviations in smartphone resource utilisation are used as indicators of smartphone intrusions. For DroidLight, we use the OCC algorithm that is proposed by [10].…”
Section: Droidlight Approach To Intrusion Detectionmentioning
confidence: 99%