4.7 Article

An optimized and efficient android malware detection framework for future sustainable computing

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

DeepCatra: Learning flow- and graph-based behaviours for Android malware detection

Yafei Wu et al.

Summary: This study proposes DeepCatra, a multi-view learning approach for Android malware detection, which achieves considerable improvement by considering static call traces and extracting features in malware detection.

IET INFORMATION SECURITY (2023)

Article Computer Science, Information Systems

An Enhanced Deep Learning Neural Network for the Detection and Identification of Android Malware

Pakarat Musikawan et al.

Summary: Android-based mobile devices have become popular due to their ease of use and wide range of capabilities. However, this popularity has also attracted attackers who use sophisticated malware obfuscation and detection avoidance tactics. In this article, an improved deep neural network called AMDI-Droid is presented to safeguard Android devices from malicious apps. The model combines multiple hidden layers to learn effective feature representations and uses a blending approach to produce final predictions.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Artificial Intelligence

Cost-effective ensemble models selection using deep reinforcement learning

Yoni Birman et al.

Summary: Ensemble learning is a common technique that applies multiple learning models to the same task to improve classification accuracy. SPIREL is a novel cost-effective classification method that dynamically assigns different learning models and classification thresholds, showing high cost-effectiveness in large malware datasets.

INFORMATION FUSION (2022)

Article Computer Science, Information Systems

An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks

Prabhat Kumar et al.

Summary: Internet of Medical Things (IoMT), a branch of Internet of Things (IoT), provides unparalleled benefits in improving patient care quality and treatment efficiency. However, the increasing severity and frequency of cyber-attacks in IoMT environments pose significant challenges.

COMPUTER COMMUNICATIONS (2021)

Article Computer Science, Theory & Methods

DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network

Syed Ibrahim Imtiaz et al.

Summary: As the use of Android smartphones becomes more widespread, there is an increasing need for more efficient methods to detect and prevent malicious applications from attacking and compromising user devices.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)

Article Computer Science, Artificial Intelligence

Feature selection using binary grey wolf optimizer with elite-based crossover for Arabic text classification

Hamouda Chantar et al.

NEURAL COMPUTING & APPLICATIONS (2020)

Article Computer Science, Information Systems

Research on data mining of permissions mode for Android malware detection

Chao Wang et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Computer Science, Hardware & Architecture

A novel parallel classifier scheme for vulnerability detection in Android

Shivi Garg et al.

COMPUTERS & ELECTRICAL ENGINEERING (2019)

Article Computer Science, Information Systems

A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding

Jixin Zhang et al.

COMPUTERS & SECURITY (2019)

Article Computer Science, Information Systems

Detecting sensitive data leakage via inter-applications on Android using a hybrid analysis technique

Nguyen Tan Cam et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Computer Science, Artificial Intelligence

Binary Grey Wolf Optimizer for large scale unit commitment problem

Lokesh Kumar Panwar et al.

SWARM AND EVOLUTIONARY COMPUTATION (2018)

Article Computer Science, Artificial Intelligence

Binary grey wolf optimization approaches for feature selection

E. Emary et al.

NEUROCOMPUTING (2016)

Article Computer Science, Information Systems

Distributed denial of service attack detection using an ensemble of neural classifier

P. Arun Raj Kumar et al.

COMPUTER COMMUNICATIONS (2011)

Review Computer Science, Artificial Intelligence

Ensemble-based classifiers

Lior Rokach

ARTIFICIAL INTELLIGENCE REVIEW (2010)