The rise of “malware”: Bibliometric analysis of malware study

MF Ab Razak, NB Anuar, R Salleh, A Firdaus - Journal of Network and …, 2016 - Elsevier
Malicious software (malware) is a computer program designed to create harmful and
undesirable effects. It considered as one of the many dangerous threats for Internet users …

Android malware detection techniques: A literature review

M Dhalaria, E Gandotra - Recent Patents on Engineering, 2021 - ingentaconnect.com
Objective: This paper provides the basics of Android malware, its evolution and tools and
techniques for malware analysis. Its main aim is to present a review of the literature on …

Bio-inspired for features optimization and malware detection

MFA Razak, NB Anuar, F Othman, A Firdaus… - Arabian Journal for …, 2018 - Springer
The leaking of sensitive data on Android mobile device poses a serious threat to users, and
the unscrupulous attack violates the privacy of users. Therefore, an effective Android …

Research on data mining of permissions mode for Android malware detection

C Wang, Q Xu, X Lin, S Liu - Cluster Computing, 2019 - Springer
Android system uses a permission mechanism to allow users and developers to regulate
access to private information and system resources required by Android applications (apps) …

FAMOUS: Forensic Analysis of MObile devices Using Scoring of application permissions

A Kumar, KS Kuppusamy, G Aghila - Future Generation Computer Systems, 2018 - Elsevier
With the emergence of Android as a leading operating system in mobile devices, it becomes
mandatory to develop specialized, predictive and robust security measures to provide a …

Behaviour analysis of inter-app communication using a lightweight monitoring app for malware detection

M Grace, M Sughasiny - Expert Systems with Applications, 2022 - Elsevier
Smartphone communications are becoming more and more useful for businesses to plan
and organize their work and are mainly operated with android applications. The …

Permission based detection system for android malware

A Utku, İ Dogru - Journal of the Faculty of Engineering and …, 2017 - avesis.gazi.edu.tr
Nowadays uses and functionality of mobile devices show a large increase. Mobile devices
have become platforms where users keep personal information. Due to such characteristics …

“Less give more”: evaluate and zoning android applications

MF Ab Razak, NB Anuar, R Salleh, A Firdaus, M Faiz… - Measurement, 2019 - Elsevier
The Android security mechanism is the first approach to protect data, system resource as
well as reduce the impact of malware. Past malware studies tend to investigate the novel …

Mobile applications recommendation based on user ratings and permissions

RC Jisha, R Krishnan… - … Conference on Advances …, 2018 - ieeexplore.ieee.org
Nowadays a large number of portable android applications are coming in the market. So, it
has become a very difficult task for the user to ensure the security of the mobile applications …

Effective cyber security strategies for small businesses

KD Cook - 2017 - search.proquest.com
Disruptive technologies developed in the digital age expose individuals, businesses, and
government entities to potential cyber security vulnerabilities. Through the conceptual …