Acceso abierto

Improving mobile security: A study on android malware detection using LOF

 y   
18 sept 2024

Cite
Descargar portada

Kinoon M.A., Omar M., Mohaisen M., Mohaisen D., Security breaches in the healthcare domain: a spatiotemporal analysis, Computational Data and Social Networks: 10th International Conference, CSoNet 2021, Virtual, 15–17 November 2021, Proceedings 10, 171–183, Springer, 2021. KinoonM.A. OmarM. MohaisenM. MohaisenD. Security breaches in the healthcare domain: a spatiotemporal analysis Computational Data and Social Networks: 10th International Conference, CSoNet 2021, Virtual 15–17 November 2021 Proceedings 10, 171 183 Springer 2021 Search in Google Scholar

Omar M., New Threats and Countermeasures in Digital Crime and Cyber Terrorism (Chapter: Insider threats detecting and controlling malicious insiders), 162–172, 2015. OmarM. New Threats and Countermeasures in Digital Crime and Cyber Terrorism (Chapter: Insider threats detecting and controlling malicious insiders) 162 172 2015 Search in Google Scholar

Omar M., Machine Learning for Cybersecurity: Innovative Deep Learning Solutions (1st Ed.), Springer, 2022. OmarM. Machine Learning for Cybersecurity: Innovative Deep Learning Solutions 1st Ed. Springer 2022 Search in Google Scholar

Omar M., VulDefend: A novel technique based on pattern–exploiting training for detecting software vulnerabilities using language models, 2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology, 22–24 May 2023, Amman, Jordan. OmarM. VulDefend: A novel technique based on pattern–exploiting training for detecting software vulnerabilities using language models 2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology 22–24 May 2023 Amman, Jordan Search in Google Scholar

Omar M., Jones R., Burrell D.N., Dawson M., Nobles C., Mohammed D., Bashir A.K., Transformational Interventions for Business, Technology and Healthcare (Chapter 7: Harnessing the power and simplicity of decision trees to detect IoT malware), 215–229, IGI Global, 2023. OmarM. JonesR. BurrellD.N. DawsonM. NoblesC. MohammedD. BashirA.K. Transformational Interventions for Business, Technology and Healthcare (Chapter 7: Harnessing the power and simplicity of decision trees to detect IoT malware) 215 229 IGI Global 2023 Search in Google Scholar

Statista. (n.d.), Global smartphone OS market share of Android, https://www.statista.com/statistics/236027/global-smartphone-os-market-share-of-android/, Accessed: December 15, 2023. Statista (n.d.), Global smartphone OS market share of Android https://www.statista.com/statistics/236027/global-smartphone-os-market-share-of-android/ Accessed: December 15, 2023. Search in Google Scholar

Zhou Y., Jiang X., Dissecting android malware: Characterization and evolution, 2012 IEEE Symposium on Security and Privacy, 20–23 May 2012, San Francisco, California, USA. ZhouY. JiangX. Dissecting android malware: Characterization and evolution 2012 IEEE Symposium on Security and Privacy 20–23 May 2012 San Francisco, California, USA Search in Google Scholar

Felt A.P., Chin E., Hanna S., Song D., Wagner D., Android permissions demystified, Proceedings of the 18th ACM Conference on Computer and Communications Security, 17–21 October 2011, Chicago, Illinois, USA. FeltA.P. ChinE. HannaS. SongD. WagnerD. Android permissions demystified Proceedings of the 18th ACM Conference on Computer and Communications Security 17–21 October 2011 Chicago, Illinois, USA Search in Google Scholar

Omar M., Smartphone security: Defending Android-based smartphone against emerging malware attacks, (PhD Thesis), Colorado Technical University, USA, 2012. OmarM. Smartphone security: Defending Android-based smartphone against emerging malware attacks, (PhD Thesis) Colorado Technical University USA 2012 Search in Google Scholar

Omar M., Dawson M., Research in progress-defending android smartphones from malware attacks, 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT), 288–292, IEEE, 2013. OmarM. DawsonM. Research in progress-defending android smartphones from malware attacks 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT) 288 292 IEEE, 2013 Search in Google Scholar

Banisakher M., Omar M., A world of cyber attacks (a survey), KSU Proceedings on Cybersecurity Education, Research and Practice, 7, 1–6, 2019. BanisakherM. OmarM. A world of cyber attacks (a survey), KSU Proceedings on Cybersecurity Education Research and Practice 7 1 6 2019 Search in Google Scholar

Omar M., Mohammed D., Nguyen V., Dawson M., Banisakher M., Research Anthology on Securing Mobile Technologies and Applications (Chapter 34: Android application security), 610–625, IGI Global, 2021. OmarM. MohammedD. NguyenV. DawsonM. BanisakherM. Research Anthology on Securing Mobile Technologies and Applications (Chapter 34: Android application security) 610 625 IGI Global 2021 Search in Google Scholar

Faruki P., Bharmal A., Laxmi V., Ganmoor V., Gaur M.S., Conti M., Rajarajan M., Android security: a survey of issues malware penetration and defenses, IEEE Communications Surveys and Tutorials, 17(2), 998–1022, 2015. FarukiP. BharmalA. LaxmiV. GanmoorV. GaurM.S. ContiM. RajarajanM. Android security: a survey of issues malware penetration and defenses IEEE Communications Surveys and Tutorials 17 2 998 1022 2015 Search in Google Scholar

Mohammed D., Omar M., Nguyen V., Security Solutions for Hyperconnectivity and The Internet of Things (Chapter 5: Enhancing cyber security for financial industry through compliance and regulatory standards), 17, 113–129, 2017. MohammedD. OmarM. NguyenV. Security Solutions for Hyperconnectivity and The Internet of Things (Chapter 5: Enhancing cyber security for financial industry through compliance and regulatory standards) 17 113 129 2017 Search in Google Scholar

Mohammed D., Omar M., Nguyen V., Wireless sensor network security: approaches to detecting and avoiding wormhole attacks, Journal of Research in Business Economics and Management, 10(2), 1860–1864, 2018. MohammedD. OmarM. NguyenV. Wireless sensor network security: approaches to detecting and avoiding wormhole attacks Journal of Research in Business Economics and Management 10 2 1860 1864 2018 Search in Google Scholar

Ayub M.F., Li X., Mahmood K., Shamshad S., Saleem M.A., Omar M., Secure consumer-centric demand response management in resilient smart grid as industry 5.0 application with blockchain-based authentication, IEEE Transactions on Consumer Electronics, 1–10, 2023. AyubM.F. LiX. MahmoodK. ShamshadS. SaleemM.A. OmarM. Secure consumer-centric demand response management in resilient smart grid as industry 5.0 application with blockchain-based authentication IEEE Transactions on Consumer Electronics 1 10 2023 Search in Google Scholar

Dawson M., Omar M., Eltayeb M., Security Solutions for Hyperconnectivity and the Internet of Things, IGI Global, 2016. DawsonM. OmarM. EltayebM. Security Solutions for Hyperconnectivity and the Internet of Things IGI Global 2016 Search in Google Scholar

Dawson M., Omar M., Abramson J., Leonard B., Bessette D., Developing Next-Generation Countermeasures for Homeland Security Threat Prevention (Chapter 10: Battlefield cyberspace: Exploitation of hyperconnectivity and internet of things), 204–235, 2017. DawsonM. OmarM. AbramsonJ. LeonardB. BessetteD. Developing Next-Generation Countermeasures for Homeland Security Threat Prevention (Chapter 10: Battlefield cyberspace: Exploitation of hyperconnectivity and internet of things) 204 235 2017 Search in Google Scholar

Gholami S., Omar M., Can a student large language model perform as well as it's teacher?, arXiv:2310.02421, 2023. GholamiS. OmarM. Can a student large language model perform as well as it's teacher? arXiv:2310.02421, 2023 Search in Google Scholar

Omar M., Developing cybersecurity education capabilities at Iraqi universities, 16th Annual Conference of the Midwest Association for Information Systems, 10, 2021. OmarM. Developing cybersecurity education capabilities at Iraqi universities 16th Annual Conference of the Midwest Association for Information Systems 10 2021 Search in Google Scholar

Omar M., Choi S., Nyang D., Mohaisen D., Quantifying the performance of adversarial training on language models with distribution shifts, 1st Workshop on Cybersecurity and Social Sciences, 30 May 2022, Nagasaki, Japan. OmarM. ChoiS. NyangD. MohaisenD. Quantifying the performance of adversarial training on language models with distribution shifts 1st Workshop on Cybersecurity and Social Sciences 30 May 2022 Nagasaki, Japan Search in Google Scholar

Omar M., Choi S., Nyang D., Mohaisen D., Robust natural language processing: Recent advances challenges and future directions, IEEE Access, 10, 86038–86056, 2022. OmarM. ChoiS. NyangD. MohaisenD. Robust natural language processing: Recent advances challenges and future directions IEEE Access 10 86038 86056 2022 Search in Google Scholar

Omar M., Sukthankar G., Text-defend: Detecting adversarial examples using local outlier factor, 2023 IEEE 17th International Conference on Semantic Computing, 01–03 February 2023, California, USA. OmarM. SukthankarG. Text-defend: Detecting adversarial examples using local outlier factor 2023 IEEE 17th International Conference on Semantic Computing 01–03 February 2023 California, USA Search in Google Scholar

Saleem M.A., Li X., Mahmood K., Shamshad S., Ayub M.F., Bashir A.K., Omar M., Provably secure conditional-privacy access control protocol for intelligent customers-centric communication in VANET, IEEE Transactions on Consumer Electronics, DOI: 10.1109/TCE.2023.3324273, 2023. SaleemM.A. LiX. MahmoodK. ShamshadS. AyubM.F. BashirA.K. OmarM. Provably secure conditional-privacy access control protocol for intelligent customers-centric communication in VANET IEEE Transactions on Consumer Electronics 10.1109/TCE.2023.3324273 2023 Open DOISearch in Google Scholar

Zhou S., Ali A., Al-Fuqaha A., Omar M., Feng L., Robust risk-sensitive task offloading for edge-enabled industrial internet of things, IEEE Transactions on Consumer Electronics, DOI: 10.1109/TCE.2023.3323146, 2023. ZhouS. AliA. Al-FuqahaA. OmarM. FengL. Robust risk-sensitive task offloading for edge-enabled industrial internet of things IEEE Transactions on Consumer Electronics 10.1109/TCE.2023.3323146 2023 Open DOISearch in Google Scholar

Breunig M.M., Kriegel H.P., Raymond T.N., Sander J., LOF: identifying density-based local outliers, Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, 15–18 May 2000, Texas, USA. BreunigM.M. KriegelH.P. RaymondT.N. SanderJ. LOF: identifying density-based local outliers Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data 15–18 May 2000 Texas, USA Search in Google Scholar

Arp D., Spreitzenbarth M., Hubner M., Gascon H., Rieck K., Drebin: Effective and explainable detection of android malware in your pocket, Proceedings of the Network and Distributed System Security Symposium, Internet Society, 23–26 February 2014, San Diego, California, USA. ArpD. SpreitzenbarthM. HubnerM. GasconH. RieckK. Drebin: Effective and explainable detection of android malware in your pocket Proceedings of the Network and Distributed System Security Symposium, Internet Society 23–26 February 2014 San Diego, California, USA Search in Google Scholar