Search Results - (( java implication based algorithm ) OR ( programming based malware algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1
  2. 2

    Android malware detection using permission based static analysis by Mohd Ariffin, Noor Afiza, Casinto, Hanna Pungo

    Published 2024
    “…There have been many studies on permission-based Android malware detection. In this study, a permission-based Android malware system is analyzed. …”
    Get full text
    Get full text
    Article
  3. 3

    Android malware detection using permission based static analysis by Mohd Ariffin, Noor Afiza, Casinto, Hanna Pungo

    Published 2023
    “…There have been many studies on permission-based Android malware detection. In this study, a permission-based Android malware system is analyzed. …”
    Get full text
    Get full text
    Article
  4. 4

    Empirical study on intelligent android malware detection based on supervised machine learning by Abdullah, Talal A.A., Ali, Waleed, Abdulghafor, Rawad Abdulkhaleq Abdulmolla

    Published 2020
    “…In response, specific tools and anti-virus programs used conventional signature-based methods in order to detect such Android malware applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Coordinated Malware Eradication And Remediation Project (CMERP) by Abdollah, Mohd Faizal, S.M.M Yassin, S.M.Warusia Mohamed, Mas’ud, Mohd Zaki, Selamat, Siti Rahayu, Yusof, Robiah, Ahmad, Rabiah, Shahrin @ Sahibuddin, Shahrin

    Published 2019
    “…Therefore, integrated machine learning techniques comprises J48 and JRip are proposed as a solution in distinguish malware behaviour more accurately. This integrated classifier algorithm applied to analyse, classify and generate rules of the pattern and program behaviour of system call information in which the legal and illegal behaviours could identified. …”
    Get full text
    Get full text
    Get full text
    Technical Report
  7. 7
  8. 8

    Scrutinized System Calls Information Using J48 And Jrip For Malware Behaviour Detection by Abdollah, Mohd Faizal, S. M. M Yassin, S. M. Warusia Mohamed, Mohd Saudi, Nur Hidayah

    Published 2019
    “…Therefore, integrated machine learning techniques comprise J48 and Jrip are proposed as a solution to distinguish malware behaviour more accurately. This integrated classifier algorithm applied to analyse, classify and generate rules of the pattern and program behaviour of system call information in which, the legal and illegal behaviours could identify. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10