A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system

A Gaurav, BB Gupta, PK Panigrahi - Enterprise Information …, 2023 - Taylor & Francis
ABSTRACT The Internet of Things (IoT) is a relatively new technology that has piqued
academics' and business information systems' attention in recent years. The Internet of …

A comprehensive review on malware detection approaches

ÖA Aslan, R Samet - IEEE access, 2020 - ieeexplore.ieee.org
According to the recent studies, malicious software (malware) is increasing at an alarming
rate, and some malware can hide in the system by using different obfuscation techniques. In …

A review of android malware detection approaches based on machine learning

K Liu, S Xu, G Xu, M Zhang, D Sun, H Liu - IEEE access, 2020 - ieeexplore.ieee.org
Android applications are developing rapidly across the mobile ecosystem, but Android
malware is also emerging in an endless stream. Many researchers have studied the …

Advances in nature-inspired metaheuristic optimization for feature selection problem: A comprehensive survey

M Nssibi, G Manita, O Korbaa - Computer Science Review, 2023 - Elsevier
The main objective of feature selection is to improve learning performance by selecting
concise and informative feature subsets, which presents a challenging task for machine …

Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning

A Azmoodeh, A Dehghantanha… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) in military settings generally consists of a diverse range of Internet-
connected devices and nodes (eg, medical devices and wearable combat uniforms). These …

A comprehensive analysis of nature-inspired meta-heuristic techniques for feature selection problem

M Sharma, P Kaur - Archives of Computational Methods in Engineering, 2021 - Springer
Meta-heuristics are problem-independent optimization techniques which provide an optimal
solution by exploring and exploiting the entire search space iteratively. These techniques …

The rise of “blockchain”: bibliometric analysis of blockchain study

A Firdaus, MFA Razak, A Feizollah, IAT Hashem… - Scientometrics, 2019 - Springer
The blockchain is a technology which accumulates and compiles data into a chain of
multiple blocks. Many blockchain researchers are adopting it in multiple areas. However …

Mobile malware attacks: Review, taxonomy & future directions

A Qamar, A Karim, V Chang - Future Generation Computer Systems, 2019 - Elsevier
A pervasive increase in the adoption rate of smartphones with Android OS is noted in recent
years. Android's popular and attractive environment not only captured the attention of users …

Androdialysis: Analysis of android intent effectiveness in malware detection

A Feizollah, NB Anuar, R Salleh, G Suarez-Tangil… - computers & …, 2017 - Elsevier
The wide popularity of Android systems has been accompanied by increase in the number
of malware targeting these systems. This is largely due to the open nature of the Android …

Behavior-based ransomware classification: A particle swarm optimization wrapper-based approach for feature selection

MS Abbasi, H Al-Sahaf, M Mansoori, I Welch - Applied Soft Computing, 2022 - Elsevier
Ransomware is malware that encrypts the victim's data and demands a ransom for a
decryption key. The increasing number of ransomware families and their variants renders …