Understanding the Root of Attack in Android Malware
Open Access
- 1 November 2018
- journal article
- research article
- Published by Penerbit UTHM in The International Journal of Integrated Engineering
- Vol. 10 (6), 203-208
- https://doi.org/10.30880/ijie.2018.10.06.029
Abstract
Understanding the Root of Attack in Android MalwareThis publication has 8 references indexed in Scilit:
- The Evolution of Android Malware and Android Analysis TechniquesACM Computing Surveys, 2017
- ScanMe mobileACM SIGAPP Applied Computing Review, 2016
- Analysis of Malicious Behavior of Android AppsProcedia Computer Science, 2016
- Machine Learning for Android Malware Detection Using Permission and API CallsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Secloud: A cloud-based comprehensive and lightweight security solution for smartphonesComputers & Security, 2013
- MobSafe: cloud computing based forensic analysis for massive mobile applications using data miningTsinghua Science and Technology, 2013
- Malware analysis performance enhancement using cloud computingJournal of Computer Virology and Hacking Techniques, 2013
- Mining Permission Request Patterns from Android and Facebook ApplicationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012