African Vulture Optimization-Based Decision Tree (AVO-DT): An Innovative Method for Malware Identification and Evaluation through the Application of Meta-Heuristic Optimization Algorithm
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Talukder, S. K., M. I. I. Sakib, M. M. Rahman. Model for e-Government in Bangladesh: A Unique ID-Based Approach. – In: Proc. of International Conference on Informatics, Electronics Vision (ICIEV’14), May 2014, pp. 1-6.Search in Google Scholar
Talukder, S., B. Carbunar. When a Friend Becomes Abuser: Evidence of Friend Abuse in Facebook. – In: Proc. of 9th ACM Conference on Web Science, Ser. WebSci ’17. New York, NY, USA, ACM, June 2017 (Online). http://doi.acm.org/10.1145/3091478.3098869.Search in Google Scholar
Talukder, S. K., M. I. I. Sakib, M. M. Rahman. Digital Land Management System: A New Initiative for Bangladesh. – In: Proc. of 2014 International Conference on Electrical Engineering and Information Communication Technology, April 2014, pp. 1-6.Search in Google Scholar
Talukder, S., I. I. Sakib, F. Hossen, Z. R. Talukder, S. Hossain. Attacks and Defenses in Mobile IP: Modeling with Stochastic Game Petri Net. – In: Proc. of 2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC’17). IEEE, 2017, pp. 18-23.Search in Google Scholar
Li, C., et al. Backdoor Attack on Machine Learning Based Android Malware Detectors. – In: IEEE Transactions on Dependable and Secure Computing, July 2021. DOI: 10.1109/TDSC.2021.3094824.Search in Google Scholar
Blazytko, T., M. Contag, C. Aschermann, T. Holz. Syntia: Synthe-Sizing the Semantics of Obfuscated Code. – In: Proc. of 26th USENIX Security Symposium (USENIX Security 17), 2017, pp. 643-659.Search in Google Scholar
Zhu, H., Y. Li, R. Li, J. Li, Z. You, H. Song. SEDMDroid: An Enhanced Stacking Ensemble Framework for Android Malware Detection. – In: IEEE Transactions on Network Science and Engineering, Vol. 8, 1 April-June 2021, No 2, pp. 984-994. DOI: 10.1109/TNSE.2020.2996379.Search in Google Scholar
Kakavand, M., D. Mohammad, D. Ali. Application of Machine Learning Algorithms for Android Malware Detection. – In: Proc. of International Conference on Computational Intelligence and Intelligent Systems (CIIS’18), Phuket, Thailand, 17-19 November 2018, pp. 32-36.Search in Google Scholar
Lopes, J., C. Serrao, L. Nunes, A. Almeida, J. Oliveira. Overview of Machine Learning Methods for Android Malware Identification. – In: Proc. of 7th IEEE International Symposium on Digital Forensics and Security (ISDFS’19), Barcelos, Portugal, 10-12 June 2019, pp. 1-6.Search in Google Scholar
Alzubaidi, A. Recent Advances in Android Mobile Malware Detection: A Systematic Literature Review. – In: IEEE Access, Vol. 9, 2021, pp. 146318-146349. DOI: 10.1109/ACCESS.2021.3123187.Search in Google Scholar
Kato, H., T. Sasaki, I. Sasase. Android Malware Detection Based on Composition Ratio of Permission Pairs. – In: IEEE Access, Vol. 9, 2021, pp. 130006-130019. DOI: 10.1109/ACCESS.2021.3113711.Search in Google Scholar
Wang, Z., J. Cai, S. Cheng, M. Li. DroidDeepLearner: Identifying Android Malware Using Deep Learning. – In: Proc. of 37th IEEE Sarnoff Symposium, Newark, NJ, USA, 19-21 September, pp. 160-165.Search in Google Scholar
Li, C., et al. Backdoor Attack on Machine Learning Based Android Malware Detectors. – In: IEEE Transactions on Dependable and Secure Computing, July 2021. DOI: 10.1109/TDSC.2021.3094824.Search in Google Scholar
Gong, L., Z. Li, H. Wang, H. Lin, X. Ma, Y. Liu. Overlay-Based Android Malware Detection at Market Scales: Systematically Adapting to the New Technological Landscape. – In: IEEE Transactions on Mobile Computing. DOI: 10.1109/TMC.2021.3079433.Search in Google Scholar
Surendran, R., T. Thomas, S. Emmanuel. GSDroid: Graph Signal Based Compact Feature Representation for Android Malware Detection. – Expert Systems with Applications, 2020, 113581.Search in Google Scholar
Mahindru, A., A. L. Sangal. MLDroid – Framework for Android Malware Detection Using Machine Learning Techniques. – Neural Computing and Applications, 2020, pp. 1-58.Search in Google Scholar
Martinelli, F., et al. Model Checking and Machine Learning Techniques for Humming Bad Mobile Malware Detection and Mitigation. – Simulation Modelling Practice and Theory, Vol. 105, 2020, 102169.Search in Google Scholar
Almomani, I., et al. Android Ransomware Detection Based on a Hybrid Evolutionary Approach in the Context of Highly Imbalanced Data. – In: IEEE Access, Vol. 9, 2021, pp. 57674-57691. DOI: 10.1109/ACCESS.2021.3071450.Search in Google Scholar
Mercaldo, F., A. Santone. Formal Equivalence Checking for Mobile Malware Detection and Family Classification. – In: IEEE Transactions on Software Engineering. DOI: 10.1109/TSE.2021.3067061.Search in Google Scholar
Vu, L. N., S. Jung. AdMat: A CNN-on-Matrix Approach to Android Malware Detection and Classification. – In: IEEE Access, Vol. 9, 2021, pp. 39680-39694. DOI: 10.1109/ACCESS.2021.3063748.Search in Google Scholar
Gong, L., et al. Systematically Landing Machine Learning onto Market-Scale Mobile Malware Detection. – In: IEEE Transactions on Parallel and Distributed Systems, Vol. 32, 1 July 2021, No 7, pp. 1615-1628. DOI: 10.1109/TPDS.2020.3046092.Search in Google Scholar
Yuan, W., Y. Jiang, H. Li, M. Cai. A Lightweight On-Device Detection Method for Android Malware. – In: IEEE Transactions on Systems, Man, and Cybernetics: Systems, Vol. 51, September 2021, No 9, pp. 5600-5611. DOI: 10.1109/TSMC.2019.2958382.Search in Google Scholar
Liu, K., S. Xu, G. Xu, M. Zhang, D. Sun, H. Liu. A Review of Android Malware Detection Approaches Based on Machine Learning. – In: IEEE Access, Vol. 8, 2020, pp. 124579-124607. DOI: 10.1109/ACCESS.2020.3006143.Search in Google Scholar
Li, D., Q. Li. Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection. – In: IEEE Transactions on Information Forensics and Security, Vol. 15, 2020, pp. 3886-3900. DOI: 10.1109/TIFS.2020.3003571.Search in Google Scholar
Abdollahzadeh, B., F. Gharehchopogh, S. Mirjalili, M. N. Noraziah. African Vultures Optimization Algorithm: A New Nature-Inspired Metaheuristic Algorithm for Global Optimization Problems. – Computers & Industrial Engineering, 2021. DOI: 10.1016/j.cie.2021.107408.Search in Google Scholar
Enck, W., P. Gilbert, B. Gon Chun, L. P. Cox, J. Jung, P. McDaniel, A. Sheth. Taintdroid: An Information-Flow Tracking System for Real-Time Privacy Monitoring on Smartphones. – In: Proc. of USENIX Symposium on Operating Systems Design and Implementation (OSDI’10), 2010, pp. 393-407.Search in Google Scholar
Yan, L.-K., H. Yin. Droidscope: Seamlessly Reconstructing OS and Dalvik Semantic Views for Dynamic Android Malware Analysis. – In: Proc. of USENIX Security Symposium, 2012.Search in Google Scholar
Mehtab, A., W. B. Shahid, T. Yaqoob et al. AdDroid: Rule-Based Machine Learning Framework for Android Malware Analysis. – Mobile Netw. Appl., Vol. 25, 2020, pp. 180-192. DOI: 10.1007/s11036-019-01248-0.Search in Google Scholar
Vasan, D., M. Alazab, S. Wassan et al. IMCFN: Image-Based Malware Classification Using Fine-Tuned Convolutional Neural Network Architecture. – Comput. Netw., Vol. 171, 2020, 107138. DOI: 10.1016/j.comnet.2020.107138.Search in Google Scholar
Wang, J., Q. Jing, J. Gao et al. SEdroid: A Robust Android Malware Detector Using Selective Ensemble Learning. – IEEE Wirel Commun Netw Conf., 2020, pp. 1-5. DOI: 10.1109/WCNC45663.2020.9120537.Search in Google Scholar
Kumar, P. K., V. Sharma. A Novel Efficient Optimized Machine Learning Approach to Detect Malware Activities in Android Applications. – Multimedica Tools and Application, Vol. 82, April 2023.Search in Google Scholar
Guliashki, V., L. Kirilov, A. Nuzi. Optimization Models and Strategy Approaches Dealing with Economic Crises, Natural Disasters, and Pandemics – An Overview. – Cybernetics and Information Technologies, Vol. 23, 2023, No 4, pp. 3-25.Search in Google Scholar