咨询与建议

限定检索结果

文献类型

  • 129 篇 期刊文献
  • 86 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 217 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 206 篇 工学
    • 186 篇 计算机科学与技术...
    • 70 篇 电气工程
    • 55 篇 信息与通信工程
    • 38 篇 软件工程
    • 13 篇 控制科学与工程
    • 5 篇 网络空间安全
    • 3 篇 仪器科学与技术
    • 2 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 石油与天然气工程
  • 19 篇 管理学
    • 16 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 理学
    • 10 篇 化学
    • 3 篇 生物学
    • 2 篇 数学
  • 3 篇 农学
    • 3 篇 水产
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学

主题

  • 217 篇 android malware ...
  • 63 篇 machine learning
  • 30 篇 deep learning
  • 29 篇 static analysis
  • 19 篇 feature extracti...
  • 17 篇 mobile security
  • 15 篇 malware
  • 11 篇 feature selectio...
  • 9 篇 graph neural net...
  • 9 篇 function call gr...
  • 7 篇 classification
  • 6 篇 ensemble learnin...
  • 5 篇 malware classifi...
  • 5 篇 adversarial mach...
  • 5 篇 semantics
  • 5 篇 smart phones
  • 5 篇 codes
  • 5 篇 security
  • 5 篇 artificial intel...
  • 5 篇 training

机构

  • 5 篇 chinese acad sci...
  • 5 篇 univ chinese aca...
  • 4 篇 univ elect sci &...
  • 3 篇 univ sci & techn...
  • 3 篇 beijing univ tec...
  • 3 篇 harbin inst tech...
  • 3 篇 sichuan univ sch...
  • 3 篇 southwest univ s...
  • 3 篇 beijing univ pos...
  • 3 篇 west virginia un...
  • 2 篇 shandong prov ke...
  • 2 篇 hong kong polyte...
  • 2 篇 cheikh anta diop...
  • 2 篇 natl taiwan univ...
  • 2 篇 tsinghua univ de...
  • 2 篇 shandong univ pe...
  • 2 篇 fujian normal un...
  • 2 篇 univ basque coun...
  • 2 篇 univ basque coun...
  • 2 篇 xinjiang univ sc...

作者

  • 5 篇 ye yanfang
  • 5 篇 hou shifu
  • 4 篇 yuan wei
  • 4 篇 ouya samuel
  • 4 篇 zhu dali
  • 4 篇 vinod p.
  • 4 篇 zhang yiming
  • 3 篇 xue jingfeng
  • 3 篇 nazir ahsan
  • 3 篇 wajahat ahsan
  • 3 篇 wang ruoyu
  • 3 篇 chen zhenxiang
  • 3 篇 moonsamy veelash...
  • 3 篇 ge xiuting
  • 3 篇 mahmood tariq
  • 3 篇 li heng
  • 3 篇 conti mauro
  • 3 篇 luo xiapu
  • 3 篇 sezer sakir
  • 3 篇 bostani hamid

语言

  • 216 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=Android Malware Detection"
217 条 记 录,以下是121-130 订阅
排序:
Cognitively Inspired Three-Way Decision Making and Bi-Level Evolutionary Optimization for Mobile Cybersecurity Threats detection: A Case Study on android malware
收藏 引用
COGNITIVE COMPUTATION 2024年 第6期16卷 3200-3227页
作者: Jerbi, Manel Dagdia, Zaineb Chelly Bechikh, Slim Ben Said, Lamjed Univ Tunis ISG CS Dept SMART Lab Tunis Tunisia Univ Luxembourg Fac Sci Technol & Med L-4364 Esch Sur Alzette Luxembourg Univ Tunis LARODEC ISG Tunis Tunisia Univ Paris Saclay DAVID UVSQ Paris France
Malicious apps use a variety of methods to spread infections, take over computers and/or IoT devices, and steal sensitive data. Several detection techniques have been proposed to counter these attacks. Despite the pro... 详细信息
来源: 评论
Novel Multi-Classification Dynamic detection Model for android malware Based on Improved Zebra Optimization Algorithm and LightGBM
收藏 引用
SENSORS 2024年 第18期24卷 5975页
作者: Zhou, Shuncheng Li, Honghui Fu, Xueliang Han, Daoqi He, Xin Inner Mongolia Agr Univ Coll Comp & Informat Engn Hohhot 010018 Peoples R China
With the increasing popularity of android smartphones, malware targeting the android platform is showing explosive growth. Currently, mainstream detection methods use static analysis methods to extract features of the... 详细信息
来源: 评论
CloudIntellMal: An advanced cloud based intelligent malware detection framework to analyze android applications
收藏 引用
COMPUTERS & ELECTRICAL ENGINEERING 2024年 第PartA期119卷
作者: Mishra, Preeti Jain, Tanmay Aggarwal, Palak Paul, Gunjan Gupta, Brij B. Attar, Razaz Waheeb Gaurav, Akshat Doon Univ Sch Technol Dept Comp Sci Dehra Dun India Reverie Language Technol Ltd Bangalore India Cognizant Ghaziabad India Amazon Bangalore India Asia Univ Dept Comp Sci & Informat Engn Taichung Taiwan Kyung Hee Univ 26 Kyungheedae Ro Seoul South Korea Symbiosis Int Univ Symbiosis Ctr Informat Technol SCIT Pune India Univ Petr & Energy Studies UPES Ctr Interdisciplinary Res Dehra Dun India Princess Nourah bint Abdulrahman Univ Coll Business Adm Management Dept POB 84428 Riyadh 11671 Saudi Arabia Ronin Inst Montclair NJ USA
Serverless computing has become very popular in recent times which facilitates a greater abstraction in virtualization technology. With the rapid development in serverless computing, a new paradigm has been evolved to... 详细信息
来源: 评论
Two Phase Static Analysis Technique for android malware detection  15
Two Phase Static Analysis Technique for Android Malware Dete...
收藏 引用
3rd International Symposium on Women in Computing and Informatics (WCI)
作者: Kate, Priyadarshani M. Dhavale, Sunita V. Def Inst Adv Technol Dept Comp Engn Pune 411025 Maharashtra India
The growing popularity of android based smart phones has greatly fuelled the spread of android malware. Further, these malwares are evolving rapidly to escape from traditional signature -based detection methods. Hence... 详细信息
来源: 评论
An adaptive semi-supervised deep learning-based framework for the detection of android malware
收藏 引用
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2023年 第3期45卷 5141-5157页
作者: Wajahat, Ahsan He, Jingsha Zhu, Nafei Mahmood, Tariq Nazir, Ahsan Pathan, Muhammad Salman Qureshi, Sirajuddin Ullah, Faheem Beijing Univ Technol Fac Informat Technol Beijing Peoples R China Lasbela Univ Agr Water & Marine Sci Dept Comp Sci Lasebla Pakistan Univ Educ Fac Informat Sci Vehari Campus Vehari Pakistan Sci Maynooth Univ Dept Comp Maynooth Ireland
Positive developments in smartphone usage have led to an increase in malicious attacks, particularly targeting android mobile devices. android has been a primary target for malware exploiting security vulnerabilities ... 详细信息
来源: 评论
Unified detection of Obfuscated and Native android malware
收藏 引用
Computers, Materials & Continua 2022年 第2期70卷 3099-3116页
作者: Pagnchakneat C.Ouk Wooguil Pak Department of Computer Engineering Keimyung UniversityDaegu42601Korea Department of Information and Communication Engineering Yeungnam UniversityGyeongsanGyeongbuk38541Korea
The android operating system has become a leading smartphone platform for mobile and other smart devices,which in turn has led to a diversity of malware *** amount of research on android malware detection has increase... 详细信息
来源: 评论
A Lightweight malware detection technique based on hybrid fuzzy simulated annealing clustering in android apps
收藏 引用
EGYPTIAN INFORMATICS JOURNAL 2024年 28卷
作者: Chimeleze, Collins Jamil, Norziana Alturki, Nazik Zain, Zuhaira Muhammad Univ Tenaga Nas Inst Informat & Comp Energy Kajang Malaysia United Arab Emirates Univ Coll IT Dept Informat Syst & Secur POB 15551 Abu Dhabi U Arab Emirates Princess Nourah Bint Abdulrahman Univ Coll Comp & Informat Sci Dept Informat Syst POB 84428 Riyadh 11671 Saudi Arabia
The growing complexity of cyber threats has shifted the focus from merely identifying threats to detecting their origins, resulting in stronger defenses against malware. Traditional detection techniques are often inad... 详细信息
来源: 评论
detection approaches for android malware: Taxonomy and review analysis
收藏 引用
EXPERT SYSTEMS WITH APPLICATIONS 2024年 第PartF期238卷
作者: Manzil, Hashida Haidros Rahima Naik, S. Manohar Cent Univ Kerala Dept Comp Sci Periye Kerala India
The main objective of this review is to present an in-depth study of android malware detection approaches. This article provides a comprehensive survey of 150 studies on android malware detection from 2010 to 2022. Tw... 详细信息
来源: 评论
An Early detection of android malware Using System Calls based Machine Learning Model  22
An Early Detection of Android Malware Using System Calls bas...
收藏 引用
17th International Conference on Availability, Reliability and Security (ARES)
作者: Zhang, Xinrun Mathur, Akshay Zhao, Lei Rahmat, Safia Niyaz, Quamar Javaid, Ahmad Yang, Xiaoli Purdue Univ Northwest Hammond IN 46323 USA Univ Toledo 2801 W Bancroft St Toledo OH 43606 USA
Several host intrusion detection systems (HIDSs) based on system call analysis have been proposed in the past to detect intrusions and malware using relevant datasets. Machine learning (ML) techniques have been applie... 详细信息
来源: 评论
A Lightweight On-Device detection Method for android malware
收藏 引用
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS 2021年 第9期51卷 5600-5611页
作者: Yuan, Wei Jiang, Yuan Li, Heng Cai, Minghui Huazhong Univ Sci & Technol Sch Elect Informat & Commun Wuhan 430074 Peoples R China Tencent Shenzhen Peoples R China
android malware poses severe threats to users, hence raising an urgent demand for malware detection. In-cloud android malware detection often suffers privacy leakage and communication overheads. Therefore, this articl... 详细信息
来源: 评论