A survey of app store analysis for software engineering

W Martin, F Sarro, Y Jia, Y Zhang… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
App Store Analysis studies information about applications obtained from app stores. App
stores provide a wealth of information derived from users that would not exist had the …

The rise of “malware”: Bibliometric analysis of malware study

MF Ab Razak, NB Anuar, R Salleh, A Firdaus - Journal of Network and …, 2016 - Elsevier
Malicious software (malware) is a computer program designed to create harmful and
undesirable effects. It considered as one of the many dangerous threats for Internet users …

Screening smartphone applications using malware family signatures

J Lee, S Lee, H Lee - computers & security, 2015 - Elsevier
The sharp increase in smartphone malware has become one of the most serious security
problems. Since the Android platform has taken the dominant position in smartphone …

SpyDroid: A framework for employing multiple real-time malware detectors on Android

S Iqbal, M Zulkernine - 2018 13th International Conference on …, 2018 - ieeexplore.ieee.org
Android has become the leading operating system for next-generation smart devices.
Consequently, the number of Android malware has also skyrocketed. Many dynamic …

Android malware detection based on software complexity metrics

M Protsenko, T Müller - International Conference on Trust, Privacy and …, 2014 - Springer
In this paper, we propose a new approach for the static detection of Android malware by
means of machine learning that is based on software complexity metrics, such as McCabe's …

Characterizing evaluation practices of intrusion detection methods for smartphones

AJ Alzahrani, N Stakhanova… - Journal of Cyber …, 2014 - journals.riverpublishers.com
The appearance of a new Android platform and its popularity has resulted in a sharp rise in
the number of reported vulnerabilities and consequently in the number of mobile threats …

Investigating Android permissions and intents for malware detection

FI Abro - 2018 - openaccess.city.ac.uk
Today's smart phones are used for wider range of activities. This extended range of
functionalities has also seen the infiltration of new security threats. Android has been the …

Детектирование вредоносного программного обеспечения с применением классических и нейросетевых методов классификации

СВ Жернаков, ГН Гаврилов - Вестник Воронежского …, 2015 - cyberleninka.ru
Постановка задачи: спектр задач, решаемых современными мобильными системами
типа Android, постоянно растет. Это объясняется, с одной стороны, теми …

[PDF][PDF] Malware Detection Based on Permissions on Android Platform Using Data Mining.

TS Barhoom, MI Nasman - Journal of Engineering Research & …, 2016 - core.ac.uk
With the spreading of smart mobile devices to nearly every person, Android Operating
System is dominating the mobile's operating systems. Due to the weak policy of submitting …

App store analysis for software engineering

WJ Martin - 2017 - discovery.ucl.ac.uk
App Store Analysis concerns the mining of data from apps, made possible through app
stores. This thesis extracts publicly available data from app stores, in order to detect and …