2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing 2013
DOI: 10.1109/imis.2013.111
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Clustering Technique in Android Malware Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 37 publications
(15 citation statements)
references
References 10 publications
0
15
0
Order By: Relevance
“…Authors of [41], [42], [43], [44] used permissions to evaluate applications and rank them based on possible risk. Numerous studies simply extracted permissions and utilized machine learning to detect malicious application, [45], [46], [47], [48]. Researchers in [49], [50] argue that merely analyzing requested permissions is not sufficient for detecting malicious applications.…”
Section: Effectivenessmentioning
confidence: 99%
“…Authors of [41], [42], [43], [44] used permissions to evaluate applications and rank them based on possible risk. Numerous studies simply extracted permissions and utilized machine learning to detect malicious application, [45], [46], [47], [48]. Researchers in [49], [50] argue that merely analyzing requested permissions is not sufficient for detecting malicious applications.…”
Section: Effectivenessmentioning
confidence: 99%
“…DeepFlow, a deep learning model based on DBN architecture, was proposed to detect Android malware and achieved the highest F1 score comparing to other ML techniques [650]. Authors in [651] considered Android business and tool applications and identified malicious apps with a recall of 71% using the K-mean technique.…”
Section: ) Techniques and Methodsmentioning
confidence: 99%
“…Furthermore, in some works, the permissions have been used with some other types of features such as code-based features or app metadata-based features. For example, in [68], the app's permissions and some other metrics have been used as features and the K-means algorithm has been adopted to cluster 18,147 benign Android applications into business apps or tool apps. Also, in [69], a lightweight static analysing method has been used to extract multiple features such as permissions, API calls and network addresses, then the extracted features have been embedded in a vector to create specific patterns that used in apps classification.…”
Section: Manifest Based Featuresmentioning
confidence: 99%