High Accuracy Detection of Mobile Malware Using Machine Learning
As increasingly sophisticated and evasive malware attacks continue to emerge, more effective detection solutions to tackle the problem are being sought through the application of advanced machine learning techniques. This reprint presents several advances in the field including: a new method of gene...
Saved in:
Other Authors: | |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
Basel
MDPI - Multidisciplinary Digital Publishing Institute
2023
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_99995 | ||
005 | 20230511 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20230511s2023 xx |||||o ||| 0|eng d | ||
020 | |a books978-3-0365-7174-4 | ||
020 | |a 9783036571751 | ||
020 | |a 9783036571744 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.3390/books978-3-0365-7174-4 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a KNTX |2 bicssc | |
100 | 1 | |a Yerima, Suleiman |4 edt | |
700 | 1 | |a Yerima, Suleiman |4 oth | |
245 | 1 | 0 | |a High Accuracy Detection of Mobile Malware Using Machine Learning |
260 | |a Basel |b MDPI - Multidisciplinary Digital Publishing Institute |c 2023 | ||
300 | |a 1 electronic resource (226 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a As increasingly sophisticated and evasive malware attacks continue to emerge, more effective detection solutions to tackle the problem are being sought through the application of advanced machine learning techniques. This reprint presents several advances in the field including: a new method of generating adversarial samples through byte sequence feature extraction using deep learning; a state-of-the-art comparative evaluation of deep learning approaches for mobile botnet detection; a novel visualization-based approach that utilizes images for Android botnet detection; a study on the detection of drive-by exploits in images using deep learning; etc. Furthermore, this reprint presents state-of-the-art reviews about machine learning-based detection techniques that will increase researchers' knowledge in the field and enable them to identify future research and development directions. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by/4.0/ |2 cc |4 https://creativecommons.org/licenses/by/4.0/ | ||
546 | |a English | ||
650 | 7 | |a Information technology industries |2 bicssc | |
653 | |a malware analysis and detection | ||
653 | |a applied machine learning | ||
653 | |a mobile security | ||
653 | |a neural network | ||
653 | |a ensemble classification | ||
653 | |a botnet detection | ||
653 | |a deep learning | ||
653 | |a Android botnets | ||
653 | |a convolutional neural networks | ||
653 | |a dense neural networks | ||
653 | |a recurrent neural networks | ||
653 | |a long short-term memory | ||
653 | |a gated recurrent unit | ||
653 | |a CNN-LSTM | ||
653 | |a CNN-GRU | ||
653 | |a Android security | ||
653 | |a malware detection | ||
653 | |a code vulnerability | ||
653 | |a machine learning | ||
653 | |a malware | ||
653 | |a static analysis | ||
653 | |a dynamic analysis | ||
653 | |a hybrid analysis | ||
653 | |a security | ||
653 | |a Monte-Carlo simulation | ||
653 | |a reinforcement learning | ||
653 | |a adversarial sample | ||
653 | |a convolutional neural network | ||
653 | |a Histogram of Oriented Gradients | ||
653 | |a image processing | ||
653 | |a android botnets | ||
653 | |a digital forensic | ||
653 | |a optimization | ||
653 | |a multilayer perceptron | ||
653 | |a salp swarm algorithm | ||
653 | |a connection weights | ||
653 | |a business email compromise (BEC) | ||
653 | |a email phishing | ||
653 | |a phishing detection | ||
653 | |a machine learning (ML) | ||
653 | |a systematic literature review | ||
653 | |a steganography | ||
653 | |a steganalysis | ||
653 | |a polyglots | ||
653 | |a neural networks | ||
653 | |a n/a | ||
856 | 4 | 0 | |a www.oapen.org |u https://mdpi.com/books/pdfview/book/7088 |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/99995 |7 0 |z DOAB: description of the publication |