Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Detection approaches for android malware: Taxonomy and review analysis
HHR Manzil, SM Naik - Expert Systems with Applications, 2024 - Elsevier
The main objective of this review is to present an in-depth study of Android malware
detection approaches. This article provides a comprehensive survey of 150 studies on …
detection approaches. This article provides a comprehensive survey of 150 studies on …
SeGDroid: An Android malware detection method based on sensitive function call graph learning
Malware is still a challenging security problem in the Android ecosystem, as malware is
often obfuscated to evade detection. In such case, semantic behavior feature extraction is …
often obfuscated to evade detection. In such case, semantic behavior feature extraction is …
Mobidroid: A performance-sensitive malware detection system on mobile platform
Currently, Android malware detection is mostly performed on the server side against the
increasing number of Android malware. Powerful computing resource gives more …
increasing number of Android malware. Powerful computing resource gives more …
Multi-label classification for android malware based on active learning
The existing malware classification approaches (ie, binary and family classification) can
barely benefit subsequent analysis with their outputs. Even the family classification …
barely benefit subsequent analysis with their outputs. Even the family classification …
Influencing user's behavior concerning android privacy policy: an overview
M Di, S Nazir, F Deng - Mobile Information Systems, 2021 - Wiley Online Library
The wide‐ranging implementation of Android applications used in various devices, from
smartphones to intelligent television, has made it thought‐provoking for developers. The …
smartphones to intelligent television, has made it thought‐provoking for developers. The …
Malware phylogeny analysis using data-aware declarative process mining
Mobile phones are currently the main targets of continuous malware attacks. Usually, new
malicious code is generated conveniently changing the existing one. According to this, it …
malicious code is generated conveniently changing the existing one. According to this, it …
Automatic Detection and Analysis towards Malicious Behavior in IoT Malware
Our society is rapidly moving towards the digital age, which has led to a sharp increase in
IoT networks and devices. This growth requires more network security professionals, who …
IoT networks and devices. This growth requires more network security professionals, who …
SkillSim: voice apps similarity detection
Virtual personal assistants (VPAs), such as Amazon Alexa and Google Assistant, are
software agents designed to perform tasks or provide services to individuals in response to …
software agents designed to perform tasks or provide services to individuals in response to …
A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps
Authorship identification is the process of identifying and classifying authors through given
codes. Authorship identification can be used in a wide range of software domains, eg, code …
codes. Authorship identification can be used in a wide range of software domains, eg, code …
Data-aware declarative process mining for malware detection
Mobile devices have become, in the last years, an essential tool used to perform daily
activities. However, they also have become the target of continuous malware attacks usually …
activities. However, they also have become the target of continuous malware attacks usually …