A review of android malware detection approaches based on machine learning

K Liu, S Xu, G Xu, M Zhang, D Sun, H Liu - IEEE access, 2020 - ieeexplore.ieee.org
Android applications are developing rapidly across the mobile ecosystem, but Android
malware is also emerging in an endless stream. Many researchers have studied the …

Comparative analysis of Android and iOS from security viewpoint

S Garg, N Baliyan - Computer Science Review, 2021 - Elsevier
Smartphone usage has increased exponentially in the recent years. Android and iOS are the
most popular smartphone platforms, while the ease of use along with the computational …

DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network

SI Imtiaz, S ur Rehman, AR Javed, Z Jalil, X Liu… - Future Generation …, 2021 - Elsevier
Android smartphones are being utilized by a vast majority of users for everyday planning,
data exchanges, correspondences, social interaction, business execution, bank …

A survey on mobile malware detection methods using machine learning

MEZN Kambar, A Esmaeilzadeh, Y Kim… - 2022 IEEE 12th …, 2022 - ieeexplore.ieee.org
The prevalence of mobile devices (smartphones) along with the availability of high-speed
internet access world-wide resulted in a wide variety of mobile applications that carry a large …

[HTML][HTML] Comprehensive review and analysis of anti-malware apps for smartphones

M Talal, AA Zaidan, BB Zaidan, OS Albahri… - Telecommunication …, 2019 - Springer
The new and disruptive technologies for ensuring smartphone security are very limited and
largely scattered. The available options and gaps in this research area must be analysed to …

Cybersecurity concerns in smart-phones and applications: A survey

MAS Bubukayr, MA Almaiah - 2021 international conference on …, 2021 - ieeexplore.ieee.org
With the greater number of individuals using smartphones and apps increasing gradually,
and with the easily of use. The users may perform more and more sensitive and critical …

A framework for privacy preserving digital trace data collection through data donation

L Boeschoten, J Ausloos, JE Möller… - Computational …, 2022 - aup-online.com
A potentially powerful method of social-scientific data collection and investigation has been
created by an unexpected institution: the law. Article 15 of the EU's 2018 General Data …

Self-supervised vision transformers for malware detection

S Seneviratne, R Shariffdeen, S Rasnayaka… - IEEE …, 2022 - ieeexplore.ieee.org
Malware detection plays a crucial role in cyber-security with the increase in malware growth
and advancements in cyber-attacks. Previously unseen malware which is not determined by …

[PDF][PDF] A comprehensive study of kernel (issues and concepts) in different operating systems

H Malallah, SR Zeebaree, RR Zebari… - Asian Journal of …, 2021 - academia.edu
Various operating systems (OS) with numerous functions and features have appeared over
time. As a result, they know how each OS has been implemented guides users' decisions on …

DeFFusion: CNN-based continuous authentication using deep feature fusion

Y Li, P Tao, S Deng, G Zhou - ACM Transactions on Sensor Networks …, 2021 - dl.acm.org
Smartphones have become crucial and important in our daily life, but the security and
privacy issues have been major concerns of smartphone users. In this article, we present …