[Retracted] A Comprehensive Review of Android Security: Threats, Vulnerabilities, Malware Detection, and Analysis
S Acharya, U Rawat… - Security and …, 2022 - Wiley Online Library
The popularity and open‐source nature of Android devices have resulted in a dramatic
growth of Android malware. Malware developers are also able to evade the detection …
growth of Android malware. Malware developers are also able to evade the detection …
Mamadroid: Detecting android malware by building markov chains of behavioral models (extended version)
As Android has become increasingly popular, so has malware targeting it, thus motivating
the research community to propose different detection techniques. However, the constant …
the research community to propose different detection techniques. However, the constant …
Mamadroid: Detecting android malware by building markov chains of behavioral models
The rise in popularity of the Android platform has resulted in an explosion of malware threats
targeting it. As both Android malware and the operating system itself constantly evolve, it is …
targeting it. As both Android malware and the operating system itself constantly evolve, it is …
CANDYMAN: Classifying Android malware families by modelling dynamic traces with Markov chains
Malware writers are usually focused on those platforms which are most used among
common users, with the aim of attacking as many devices as possible. Due to this reason …
common users, with the aim of attacking as many devices as possible. Due to this reason …
An hmm and structural entropy based detector for android malware: An empirical study
Smartphones are becoming more and more popular and, as a consequence, malware
writers are increasingly engaged to develop new threats and propagate them through official …
writers are increasingly engaged to develop new threats and propagate them through official …
Intrusion detection system for applications using linux containers
Linux containers are gaining increasing traction in both individual and industrial use, and as
these containers get integrated into mission-critical systems, real-time detection of malicious …
these containers get integrated into mission-critical systems, real-time detection of malicious …
Android resource usage risk assessment using hidden Markov model and online learning
With Android devices users are allowed to install third-party applications from various open
markets. This raises security and privacy concerns since the third-party applications may be …
markets. This raises security and privacy concerns since the third-party applications may be …
Distributed resource allocation
In Chap. 3, we introduced a novel convex utility proportional fairness maximization for
optimal resource allocation in wireless networks and outfitted the optimization with the …
optimal resource allocation in wireless networks and outfitted the optimization with the …
Cellular communications systems in congested environments
This volume addresses the concept of radio resource allocation for cellular communications
systems operating in congested and contested environments with an emphasis on end-to …
systems operating in congested and contested environments with an emphasis on end-to …
Utility functions and radio resource allocation
Utility Functions and Radio Resource Allocation | SpringerLink Skip to main content
Advertisement SpringerLink Account Menu Find a journal Publish with us Track your …
Advertisement SpringerLink Account Menu Find a journal Publish with us Track your …