2021
DOI: 10.1016/j.neucom.2020.08.095
|View full text |Cite
|
Sign up to set email alerts
|

Detecting malicious Android applications based on the network packets generated

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…For example, the authors 6‐8 use the static analysis, the References 9‐11 use a deep learning approach using static features. On the other hand, the authors in References 12‐15 detect malware with dynamic analysis. Static analysis is largely based on analyzing the content of Android apk files.…”
Section: Introductionmentioning
confidence: 99%
“…For example, the authors 6‐8 use the static analysis, the References 9‐11 use a deep learning approach using static features. On the other hand, the authors in References 12‐15 detect malware with dynamic analysis. Static analysis is largely based on analyzing the content of Android apk files.…”
Section: Introductionmentioning
confidence: 99%