2020 International Conference on Computer Science and Software Engineering (CSASE) 2020
DOI: 10.1109/csase48920.2020.9142101
|View full text |Cite
|
Sign up to set email alerts
|

Spyware Injection in Android using Fake Application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…Malware, or malicious code, encompasses several types of harmful or intrusive software such as viruses, spyware, worms, Trojan horses, backdoors, and rootkits. Such software is typically designed with the explicit intent of attacking systems, whether to destroy file systems, steal data, or execute other undesirable activities [4,5].…”
Section: Introductionmentioning
confidence: 99%
“…Malware, or malicious code, encompasses several types of harmful or intrusive software such as viruses, spyware, worms, Trojan horses, backdoors, and rootkits. Such software is typically designed with the explicit intent of attacking systems, whether to destroy file systems, steal data, or execute other undesirable activities [4,5].…”
Section: Introductionmentioning
confidence: 99%