[Retracted] A Comprehensive Review of Android Security: Threats, Vulnerabilities, Malware Detection, and Analysis

S Acharya, U Rawat… - Security and …, 2022 - Wiley Online Library
The popularity and open‐source nature of Android devices have resulted in a dramatic
growth of Android malware. Malware developers are also able to evade the detection …

Mamadroid: Detecting android malware by building markov chains of behavioral models (extended version)

L Onwuzurike, E Mariconti, P Andriotis… - ACM Transactions on …, 2019 - dl.acm.org
As Android has become increasingly popular, so has malware targeting it, thus motivating
the research community to propose different detection techniques. However, the constant …

Mamadroid: Detecting android malware by building markov chains of behavioral models

E Mariconti, L Onwuzurike, P Andriotis… - arxiv preprint arxiv …, 2016 - arxiv.org
The rise in popularity of the Android platform has resulted in an explosion of malware threats
targeting it. As both Android malware and the operating system itself constantly evolve, it is …

CANDYMAN: Classifying Android malware families by modelling dynamic traces with Markov chains

A Martín, V Rodríguez-Fernández… - Engineering Applications of …, 2018 - Elsevier
Malware writers are usually focused on those platforms which are most used among
common users, with the aim of attacking as many devices as possible. Due to this reason …

An hmm and structural entropy based detector for android malware: An empirical study

G Canfora, F Mercaldo, CA Visaggio - Computers & Security, 2016 - Elsevier
Smartphones are becoming more and more popular and, as a consequence, malware
writers are increasingly engaged to develop new threats and propagate them through official …

Intrusion detection system for applications using linux containers

AS Abed, C Clancy, DS Levy - … , STM 2015, Vienna, Austria, September 21 …, 2015 - Springer
Linux containers are gaining increasing traction in both individual and industrial use, and as
these containers get integrated into mission-critical systems, real-time detection of malicious …

Android resource usage risk assessment using hidden Markov model and online learning

B Rashidi, C Fung, E Bertino - Computers & Security, 2017 - Elsevier
With Android devices users are allowed to install third-party applications from various open
markets. This raises security and privacy concerns since the third-party applications may be …

Distributed resource allocation

M Ghorbanzadeh, A Abdelhadi, C Clancy… - … Systems in Congested …, 2017 - Springer
In Chap. 3, we introduced a novel convex utility proportional fairness maximization for
optimal resource allocation in wireless networks and outfitted the optimization with the …

Cellular communications systems in congested environments

M Ghorbanzadeh, A Abdelhadi, C Clancy - Switzerland: Springer …, 2017 - Springer
This volume addresses the concept of radio resource allocation for cellular communications
systems operating in congested and contested environments with an emphasis on end-to …

Utility functions and radio resource allocation

M Ghorbanzadeh, A Abdelhadi, C Clancy… - … Systems in Congested …, 2017 - Springer
Utility Functions and Radio Resource Allocation | SpringerLink Skip to main content
Advertisement SpringerLink Account Menu Find a journal Publish with us Track your …