[1]
|
A Novel Machine Learning Approach for Android Malware Detection Based on the Co-Existence of Features
IEEE Access,
2023
DOI:10.1109/ACCESS.2023.3244656
|
|
|
[2]
|
Information Systems Management [Working Title]
2023
DOI:10.5772/intechopen.109652
|
|
|
[3]
|
Information Systems Management
2023
DOI:10.5772/intechopen.109652
|
|
|
[4]
|
A Novel Machine Learning Approach for Android Malware Detection Based on the Co-Existence of Features
IEEE Access,
2023
DOI:10.1109/ACCESS.2023.3244656
|
|
|
[5]
|
Malware Analysis Using Artificial Intelligence and Deep Learning
2021
DOI:10.1007/978-3-030-62582-5_2
|
|
|
[6]
|
An Informative and Comprehensive Behavioral Characteristics Analysis Methodology of Android Application for Data Security in Brain-Machine Interfacing
Computational and Mathematical Methods in Medicine,
2020
DOI:10.1155/2020/3658795
|
|
|
[7]
|
PACER: Platform for Android Malware Classification, Performance Evaluation and Threat Reporting
Future Internet,
2020
DOI:10.3390/fi12040066
|
|
|
[8]
|
Android Malware Family Classification and Analysis: Current Status and Future Directions
Electronics,
2020
DOI:10.3390/electronics9060942
|
|
|
[9]
|
Mobile Security: A Look into Android
2020 IEEE International Conference on Electro Information Technology (EIT),
2020
DOI:10.1109/EIT48999.2020.9208339
|
|
|
[10]
|
PACE: Platform for Android Malware Classification and Performance Evaluation
2019 IEEE International Conference on Big Data (Big Data),
2019
DOI:10.1109/BigData47090.2019.9006557
|
|
|
[11]
|
Multigenerational Online Behavior and Media Use
2019
DOI:10.4018/978-1-5225-7909-0.ch037
|
|
|
[12]
|
Hydra-Bite: Static Taint Immunity, Split, and Complot Based Information Capture Method for Android Device
Wireless Communications and Mobile Computing,
2018
DOI:10.1155/2018/2769417
|
|
|
[13]
|
Critical Socio-Technical Issues Surrounding Mobile Computing
Advances in Wireless Technologies and Telecommunication,
2016
DOI:10.4018/978-1-4666-9438-5.ch011
|
|
|
[14]
|
A Novel Approach to Detect Android Malware
Procedia Computer Science,
2015
DOI:10.1016/j.procs.2015.03.170
|
|
|
[15]
|
DWroidDump: Executable Code Extraction from Android Applications for Malware Analysis
International Journal of Distributed Sensor Networks,
2015
DOI:10.1155/2015/379682
|
|
|
[16]
|
Structural information based malicious app similarity calculation and clustering
Proceedings of the 2015 Conference on research in adaptive and convergent systems - RACS,
2015
DOI:10.1145/2811411.2811545
|
|
|
[17]
|
Structural information based malicious app similarity calculation and clustering
Proceedings of the 2015 Conference on research in adaptive and convergent systems,
2015
DOI:10.1145/2811411.2811545
|
|
|
[18]
|
Techniques for analysing Android malware
The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M),
2014
DOI:10.1109/ICT4M.2014.7020656
|
|
|