4.6 Article

Malware Analysis in IoT & Android Systems with Defensive Mechanism

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

A Novel Android Botnet Detection System Using Image-Based and Manifest File Features

Suleiman Y. Yerima et al.

Summary: This paper proposes a novel mobile botnet detection system based on features extracted from images and a manifest file. Machine Learning algorithms are used for classification of the features. The experimental results demonstrate the high accuracy of this system in detecting botnets.

ELECTRONICS (2022)

Article Computer Science, Information Systems

Change Detection in Remote Sensing Image Data Comparing Algebraic and Machine Learning Methods

Anjali Goswami et al.

Summary: Remote sensing technology has been widely used in natural resource fields, providing precise information. It is necessary to develop automatic change detection techniques to improve classification accuracy and reduce time. This study focuses on improving machine learning classification accuracy by comparing training samples and image differences.

ELECTRONICS (2022)

Article Computer Science, Information Systems

Border Security and Surveillance System Using IoT

Siham Boukhalfa et al.

Summary: This paper introduces a border surveillance system based on drones and IoT technology, which detects and tracks intruders by recognizing their gestures, and sends real-time alerts and valuation information. The system is highly effective and enables cost-efficient monitoring of the border.

INTERNATIONAL JOURNAL OF INFORMATION RETRIEVAL RESEARCH (2022)

Article Computer Science, Information Systems

DroidFDR: Automatic Classification of Android Malware Using Model Checking

Zhi Yang et al.

Summary: This paper proposes a formal detection method called DroidFDR for Android malware classification based on communicating sequential processes. The method converts the APK file of an application to Jimple representation to model the code behavior with CSP. The behavior of a sample is inputted to an FDR model checker to be simplified and verified against a process abstracted from the malware to express the family property. DroidFDR can capture the behavioral characteristics of malicious code and achieve high family classification accuracy.

ELECTRONICS (2022)

Article Computer Science, Artificial Intelligence

Inconsistency Detection-Based LOD in Smart Homes

Wassila Guebli et al.

Summary: The emergence of the internet of things in smart homes has led to a variety of services meeting user expectations, but also conflicts due to heterogeneous user preferences. A solution based on linked open data is proposed to better manage these conflicts.

INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS (2021)

Article Computer Science, Information Systems

Android Malware Detection Based on Structural Features of the Function Call Graph

Yang Yang et al.

Summary: The openness of the Android operating system brings convenience to users but also poses a threat of attack from malicious applications, making malware detection a key research focus in mobile security. The DGCNDroid method proposed in this paper effectively addresses the issues of feature selection and feature loss in graph structures in current malware detection methods, achieving higher detection accuracy through experimentation on a dataset of 11,120 Android apps.

ELECTRONICS (2021)

Article Computer Science, Information Systems

Deep Learning Techniques for Android Botnet Detection

Suleiman Y. Yerima et al.

Summary: Android, the most popular mobile operating system worldwide, is facing increasing malware threats, leading to the need for more effective detection methods. Deep learning has gained attention as a machine learning approach to enhance Android botnet detection. This paper presents a comparative study of deep learning techniques for Android botnet detection, achieving state-of-the-art results based on the ISCX botnet dataset and outperforming classical machine learning classifiers.

ELECTRONICS (2021)

Review Computer Science, Information Systems

A survey of malware detection in Android apps: Recommendations and perspectives for future research

Asma Razgallah et al.

Summary: This paper investigates the main mechanisms and approaches for malware detection in Android applications, identifying the advantages and limitations of each, and suggesting avenues for future research in this area.

COMPUTER SCIENCE REVIEW (2021)

Article Computer Science, Information Systems

Privacy Assessment in Android Apps: A Systematic Mapping Study

Jose M. Del Alamo et al.

Summary: Billions of users worldwide daily install Android apps, which access a vast amount of sensitive personal data. Various techniques have been developed to understand how apps protect or harm user privacy, but these results come from different research domains and perspectives, resulting in a scattered body of knowledge. To address this gap, a systematic mapping study was conducted to provide an overview of state-of-the-art techniques for assessing privacy in Android apps between 2016 and 2020, highlighting relevant findings, identifying pressing gaps, and discussing promising research directions.

ELECTRONICS (2021)

Article

Secured and Privacy-Based IDS for Healthcare Systems on E-Medical Data Using Machine Learning Approach

Sudhakar Sengan et al.

International Journal of Reliable and Quality E-Healthcare (2021)

Article Computer Science, Information Systems

A Survey on Mobile Malware Detection Techniques

Vasileios Kouliaridis et al.

IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS (2020)

Review Computer Science, Hardware & Architecture

A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT

Jayasree Sengupta et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Computer Science, Information Systems

Android malware detection based on system call sequences and LSTM

Xi Xiao et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2019)

Article Computer Science, Software Engineering

Empirical study of android repackaged applications

Kobra Khanmohammadi et al.

EMPIRICAL SOFTWARE ENGINEERING (2019)

Article Computer Science, Information Systems

Ransomware Detection System for Android Applications

Samah Alsoghyer et al.

ELECTRONICS (2019)

Article Computer Science, Artificial Intelligence

Named Data Networking: A Promising Architecture for the Internet of Things (IoT)

Maroua Meddeb et al.

INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS (2018)

Article Computer Science, Information Systems

Automatic Text Document Summarization Using Graph Based Centrality Measures on Lexical Network

Chandra Shakhar Yadav et al.

INTERNATIONAL JOURNAL OF INFORMATION RETRIEVAL RESEARCH (2018)

Article Engineering, Electrical & Electronic

CUTE Mote, A Customizable and Trustable End-Device for the Internet of Things

Tiago Gomes et al.

IEEE SENSORS JOURNAL (2017)

Article Computer Science, Information Systems

A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes

Tianyi Song et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Proceedings Paper Green & Sustainable Science & Technology

An Android Malware Detection System Based on Machine Learning

Long Wen et al.

GREEN ENERGY AND SUSTAINABLE DEVELOPMENT I (2017)

Proceedings Paper Computer Science, Interdisciplinary Applications

Merging Permission and API Features for Android Malware Detection

Mengyu Qiao et al.

PROCEEDINGS 2016 5TH IIAI INTERNATIONAL CONGRESS ON ADVANCED APPLIED INFORMATICS IIAI-AAI 2016 (2016)

Proceedings Paper Computer Science, Hardware & Architecture

Information Dispersion for Trojan Defense through High-Level Synthesis

S. T. Choden Konigsmark et al.

2016 ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC) (2016)

Proceedings Paper Engineering, Electrical & Electronic

Secure MQTT for Internet of Things (IoT)

Meena Singh et al.

2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015) (2015)