The evolution of android malware and android analysis techniques
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …
amounts of sensitive information. Sophisticated mobile malware, particularly Android …
A survey of app store analysis for software engineering
App Store Analysis studies information about applications obtained from app stores. App
stores provide a wealth of information derived from users that would not exist had the …
stores provide a wealth of information derived from users that would not exist had the …
A blockchain-empowered access control framework for smart devices in green internet of things
Green Internet of things (GIoT) generally refers to a new generation of Internet of things
design concept. It can save energy and reduce emissions, reduce environmental pollution …
design concept. It can save energy and reduce emissions, reduce environmental pollution …
MAPAS: a practical deep learning-based android malware detection system
A lot of malicious applications appears every day, threatening numerous users. Therefore, a
surge of studies have been conducted to protect users from newly emerging malware by …
surge of studies have been conducted to protect users from newly emerging malware by …
Droiddetector: android malware characterization and detection using deep learning
Smartphones and mobile tablets are rapidly becoming indispensable in daily life. Android
has been the most popular mobile operating system since 2012. However, owing to the …
has been the most popular mobile operating system since 2012. However, owing to the …
Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network
Android security incidents occurred frequently in recent years. To improve the accuracy and
efficiency of large-scale Android malware detection, in this work, we propose a hybrid model …
efficiency of large-scale Android malware detection, in this work, we propose a hybrid model …
{SmartAuth}:{User-Centered} authorization for the internet of things
Internet of Things (IoT) platforms often require users to grant permissions to third-party apps,
such as the ability to control a lock. Unfortunately, because few users act based upon, or …
such as the ability to control a lock. Unfortunately, because few users act based upon, or …
Androdialysis: Analysis of android intent effectiveness in malware detection
The wide popularity of Android systems has been accompanied by increase in the number
of malware targeting these systems. This is largely due to the open nature of the Android …
of malware targeting these systems. This is largely due to the open nature of the Android …