A survey on security for mobile devices

M La Polla, F Martinelli… - … communications surveys & …, 2012 - ieeexplore.ieee.org
Nowadays, mobile devices are an important part of our everyday lives since they enable us
to access a large variety of ubiquitous services. In recent years, the availability of these …

User profiling in intrusion detection: A review

J Peng, KKR Choo, H Ashman - Journal of Network and Computer …, 2016 - Elsevier
Intrusion detection systems are important for detecting and reacting to the presence of
unauthorised users of a network or system. They observe the actions of the system and its …

Droidmat: Android malware detection through manifest and api calls tracing

DJ Wu, CH Mao, TE Wei, HM Lee… - 2012 Seventh Asia joint …, 2012 - ieeexplore.ieee.org
Recently, the threat of Android malware is spreading rapidly, especially those repackaged
Android malware. Although understanding Android malware using dynamic analysis can …

[PDF][PDF] Hey, you, get off of my market: detecting malicious apps in official and alternative android markets.

Y Zhou, Z Wang, W Zhou, X Jiang - NDSS, 2012 - cs.umd.edu
In this paper, we present a systematic study for the detection of malicious applications (or
apps) on popular Android Markets. To this end, we first propose a permissionbased …

A machine learning approach to android malware detection

J Sahs, L Khan - 2012 European intelligence and security …, 2012 - ieeexplore.ieee.org
With the recent emergence of mobile platforms capable of executing increasingly complex
software and the rising ubiquity of using mobile platforms in sensitive applications such as …

MADAM: a multi-level anomaly detector for android malware

G Dini, F Martinelli, A Saracino, D Sgandurra - … on Mathematical Methods …, 2012 - Springer
Currently, in the smartphone market, Android is the platform with the highest share. Due to
this popularity and also to its open source nature, Android-based smartphones are now an …

Cloud-based malware detection game for mobile devices with offloading

L **ao, Y Li, X Huang, XJ Du - IEEE Transactions on Mobile …, 2017 - ieeexplore.ieee.org
As accurate malware detection on mobile devices requires fast process of a large number of
application traces, cloud-based malware detection can utilize the data sharing and powerful …

Detecting Android malware using long short-term memory (LSTM)

R Vinayakumar, KP Soman… - Journal of Intelligent …, 2018 - content.iospress.com
Abstract Long Short-term Memory (LSTM) is a sub set of recurrent neural network (RNN)
which is specifically used to train to learn long-term temporal dynamics with sequences of …

A TAN based hybrid model for android malware detection

R Surendran, T Thomas, S Emmanuel - Journal of Information Security and …, 2020 - Elsevier
Android devices are very popular because of their availability at reasonable prices.
However, there is a rapid rise of malware applications in Android platform in the recent past …

Applying machine learning classifiers to dynamic android malware detection at scale

B Amos, H Turner, J White - 2013 9th international wireless …, 2013 - ieeexplore.ieee.org
The widespread adoption and contextually sensitive nature of smartphone devices has
increased concerns over smartphone malware. Machine learning classifiers are a current …