Evaluation of machine learning classifiers for mobile malware detection
Published 2014 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Evaluation of machine learning classifiers for mobile malware detection
Authors
Keywords
Intrusion detection system, Machine learning, Android malware detection, Anomaly based, Mobile device
Journal
SOFT COMPUTING
Volume 20, Issue 1, Pages 343-357
Publisher
Springer Nature
Online
2014-11-14
DOI
10.1007/s00500-014-1511-6
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Mobile malware detection through analysis of deviations in application network behavior
- (2014) A. Shabtai et al. COMPUTERS & SECURITY
- Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks
- (2014) Shahaboddin Shamshirband et al. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE
- Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks
- (2014) Shahaboddin Shamshirband et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method
- (2013) P. Gogoi et al. COMPUTER JOURNAL
- MAMA: MANIFEST ANALYSIS FOR MALWARE DETECTION IN ANDROID
- (2013) Borja Sanz et al. CYBERNETICS AND SYSTEMS
- An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique
- (2013) Shahaboddin Shamshirband et al. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE
- Detecting mobile malware threats to homeland security through static analysis
- (2013) Seung-Hyun Seo et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)
- (2013) Peter Teufl et al. Security and Communication Networks
- A survey on automated dynamic malware-analysis techniques and tools
- (2012) Manuel Egele et al. ACM COMPUTING SURVEYS
- Ensemble based sensing anomaly detection in wireless sensor networks
- (2012) Daniel-Ioan Curiac et al. EXPERT SYSTEMS WITH APPLICATIONS
- Crucial Role of CD4+CD 25+ FOXP3+ T Regulatory Cell, Interferon-γ and Interleukin-16 in Malignant and Tuberculous Pleural Effusions
- (2012) Lamiaa Ibrahim et al. IMMUNOLOGICAL INVESTIGATIONS
- An intrusion detection and prevention system in cloud computing: A systematic review
- (2012) Ahmed Patel et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A graph mining approach for detecting unknown malwares
- (2012) Mojtaba Eskandari et al. JOURNAL OF VISUAL LANGUAGES AND COMPUTING
- Practical real-time intrusion detection using machine learning approaches
- (2011) Phurivit Sangkatsanee et al. COMPUTER COMMUNICATIONS
- “Andromaly”: a behavioral malware detection framework for android devices
- (2011) Asaf Shabtai et al. JOURNAL OF INTELLIGENT INFORMATION SYSTEMS
- Anomaly-based network intrusion detection: Techniques, systems and challenges
- (2008) P. García-Teodoro et al. COMPUTERS & SECURITY
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationPublish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn More