HHR Manzil, SM Naik - Expert Systems with Applications, 2023 - Elsevier
The main objective of this review is to present an in-depth study of Android malware detection approaches. This article provides a comprehensive survey of 150 studies on …
The widespread adoption of Android devices and their capability to access significant private and confidential information have resulted in these devices being targeted by …
Abstract An Internet of Things (IoT) architecture generally consists of a wide range of Internet- connected devices or things such as Android devices, and devices that have more …
RU Khan, X Zhang, R Kumar - Journal of Computer Virology and Hacking …, 2019 - Springer
We have utilized two distinct models to identify the obscure or new sort of malware in this paper. GoogleNet and ResNet models are researched and tried which belong to two …
Ransomware has become a significant global threat with the ransomware-as-a-service model enabling easy availability and deployment, and the potential for high revenues …
Emergence of crypto-ransomware has significantly changed the cyber threat landscape. A crypto ransomware removes data custodian access by encrypting valuable data on victims' …
Internet of things (IoT) is revolutionizing this world with its evolving applications in various aspects of life such as sensing, healthcare, remote monitoring, and so on. Android devices …
In spite of being just a few years old, ransomware is quickly becoming a serious threat to our digital infrastructures, data and services. Majority of ransomware families are requesting for …
In this study, a framework for Android malware detection based on permissions is presented. This framework uses multiple linear regression methods. Application permissions, which are …