The analysis of android malware behaviors

被引:0
|
作者
Department of Computer and Information Engineering, Huainan Normal University, Huainan, China [1 ]
机构
来源
Int. J. Secur. Appl. | / 3卷 / 335-346期
关键词
D O I
10.14257/ijseia.2015.9.3.26
中图分类号
学科分类号
摘要
18
引用
收藏
相关论文
共 50 条
  • [31] Malware Detection in Android by Network Traffic Analysis
    Zaman, Mehedee
    Siddiqui, Tazrian
    Amin, Mohammad Rakib
    Hossain, Md Shohrab
    2015 INTERNATIONAL CONFERENCE ON NETWORKING SYSTEMS AND SECURITY (NSYSS), 2015, : 183 - 187
  • [32] Android malware analysis and detection: A systematic review
    Dahiya, Anuradha
    Singh, Sukhdip
    Shrivastava, Gulshan
    EXPERT SYSTEMS, 2025, 42 (01)
  • [33] Machine Learning Classifiers for Android Malware Analysis
    Urcuqui Lopez, Christian Camilo
    Navarro Cadavid, Andres
    2016 IEEE COLOMBIAN CONFERENCE ON COMMUNICATIONS AND COMPUTING (COLCOM), 2016,
  • [34] Forensic Analysis on Joker Family Android Malware
    Shi, Chen
    Cheng, Chris Chao-Chun
    Guan, Yong
    2021 17TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB 2021), 2021, : 403 - 406
  • [35] A Review on Malware Analysis for IoT and Android System
    Yadav C.S.
    Gupta S.
    SN Computer Science, 4 (2)
  • [36] Comparative Analysis of Android Malware Detection Techniques
    Painter, Nishant
    Kadhiwala, Bintu
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA ENGINEERING AND COMMUNICATION TECHNOLOGY, ICDECT 2016, VOL 2, 2017, 469 : 131 - 139
  • [37] A3: Automatic Analysis of Android Malware
    Zhang, Luoshi
    Niu, Yan
    Wu, Xiao
    Wang, Zhaoguo
    Xue, Yibo
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 89 - 93
  • [38] A Critical Analysis on Android Vulnerabilities, Malware, Anti-malware and Anti-malware Bypassing
    Alrammal, Muath
    Naveed, Munir
    Sallam, Suzan
    Tsaramirsis, Georgios
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (07): : 1651 - 1661
  • [39] A Forensic Analysis of Android Malware How is Malware Written and How it Could be Detected?
    Allix, Kevin
    Jerome, Quentin
    Bissyande, Tegawende F.
    Klein, Jacques
    State, Radu
    Le Traon, Yves
    2014 IEEE 38TH ANNUAL INTERNATIONAL COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2014, : 384 - 393
  • [40] Idea: Automatic Localization of Malicious Behaviors in Android Malware with Hidden Markov Models
    Salem, Aleieldin
    Schmidt, Tabea
    Pretschner, Alexander
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, ESSOS 2018, 2018, 10953 : 108 - 115