2023
DOI: 10.3390/electronics12153253
|View full text |Cite
|
Sign up to set email alerts
|

Deep Learning-Based Attack Detection and Classification in Android Devices

Alfonso Gómez,
Antonio Muñoz

Abstract: The increasing proliferation of Androidbased devices, which currently dominate the market with a staggering 72% global market share, has made them a prime target for attackers. Consequently, the detection of Android malware has emerged as a critical research area. Both academia and industry have explored various approaches to develop robust and efficient solutions for Android malware detection and classification, yet it remains an ongoing challenge. In this study, we present a supervised learning technique tha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(3 citation statements)
references
References 64 publications
0
3
0
Order By: Relevance
“…Static analysis on the APK files of three datasets, namely CICMalDroid2020, CIC-InvestAndMal2019, and CICAndMal2017, was conducted [21]. From these files, API calls, intent, and permission-based features were extracted and 215 features were retained.…”
Section: Related Workmentioning
confidence: 99%
“…Static analysis on the APK files of three datasets, namely CICMalDroid2020, CIC-InvestAndMal2019, and CICAndMal2017, was conducted [21]. From these files, API calls, intent, and permission-based features were extracted and 215 features were retained.…”
Section: Related Workmentioning
confidence: 99%
“…D2D communication technology encounters numerous challenges, including interference mitigation, mode selection, resource allocation, and power control. Another critical issue is ensuring security, especially in the exchange of sensitive information [12,13]. The effective allocation of resources and adept power management are key to reducing interference and maximizing overall network throughput [14].…”
Section: Introductionmentioning
confidence: 99%
“…The field of D2D communication technology confronts several challenges, including interference mitigation, mode selection, resource allocation, and power control [15,16]. A significant concern is the aspect of security, especially when exchanging sensitive information [13,17]. Efficient resource allocation and effective power management lead to reduced interference and maximized overall throughput [14,18].…”
Section: Introductionmentioning
confidence: 99%