HHR Manzil, SM Naik - Expert Systems with Applications, 2023 - Elsevier
The main objective of this review is to present an in-depth study of Android malware detection approaches. This article provides a comprehensive survey of 150 studies on …
Popularity and market share of Android operating system has given significant rise to malicious apps targeting it. Traditional malware detection methods are obsolete as current …
A Ali, NA Somroo, U Farooq, M Asif… - … on Cyber Resilience …, 2022 - ieeexplore.ieee.org
This article aims to identify some of the most significant security risks an organization may face if it does not consider the inherent risks associated with personal devices in the …
Android-based smart devices cater to services in almost every aspect of our lives like personal, professional, social, banking, business, etc. However, people with increasingly …
Android OS popularity has given significant rise to malicious apps targeting it. Malware use state of the art obfuscation methods to hide their functionality and evade anti-malware …
A Bensaoud, J Kalita - Journal of Information Security and Applications, 2022 - Elsevier
Malicious software is a pernicious global problem. A novel multi-task learning framework is proposed in this paper for malware image classification for accurate and fast malware …
Steganography is a vital security approach that hides any secret content within ordinary data, such as multimedia. This hiding aims to achieve the confidentiality of the IoT secret …
Although few performance evaluation instruments have been used conventionally in different machine learning-based classification problem domains, there are numerous ones …
K Brezinski, K Ferens - Security and Communication Networks, 2023 - Wiley Online Library
The competing landscape between malware authors and security analysts is an ever‐ changing battlefield over who can innovate over the other. While security analysts are …