Accesso libero

African Vulture Optimization-Based Decision Tree (AVO-DT): An Innovative Method for Malware Identification and Evaluation through the Application of Meta-Heuristic Optimization Algorithm

INFORMAZIONI SU QUESTO ARTICOLO

Cita

Talukder, S. K., M. I. I. Sakib, M. M. Rahman. Model for e-Government in Bangladesh: A Unique ID-Based Approach. – In: Proc. of International Conference on Informatics, Electronics Vision (ICIEV’14), May 2014, pp. 1-6. Search in Google Scholar

Talukder, S., B. Carbunar. When a Friend Becomes Abuser: Evidence of Friend Abuse in Facebook. – In: Proc. of 9th ACM Conference on Web Science, Ser. WebSci ’17. New York, NY, USA, ACM, June 2017 (Online). http://doi.acm.org/10.1145/3091478.3098869. Search in Google Scholar

Talukder, S. K., M. I. I. Sakib, M. M. Rahman. Digital Land Management System: A New Initiative for Bangladesh. – In: Proc. of 2014 International Conference on Electrical Engineering and Information Communication Technology, April 2014, pp. 1-6. Search in Google Scholar

Talukder, S., I. I. Sakib, F. Hossen, Z. R. Talukder, S. Hossain. Attacks and Defenses in Mobile IP: Modeling with Stochastic Game Petri Net. – In: Proc. of 2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC’17). IEEE, 2017, pp. 18-23. Search in Google Scholar

Li, C., et al. Backdoor Attack on Machine Learning Based Android Malware Detectors. – In: IEEE Transactions on Dependable and Secure Computing, July 2021. DOI: 10.1109/TDSC.2021.3094824. Search in Google Scholar

Blazytko, T., M. Contag, C. Aschermann, T. Holz. Syntia: Synthe-Sizing the Semantics of Obfuscated Code. – In: Proc. of 26th USENIX Security Symposium (USENIX Security 17), 2017, pp. 643-659. Search in Google Scholar

Zhu, H., Y. Li, R. Li, J. Li, Z. You, H. Song. SEDMDroid: An Enhanced Stacking Ensemble Framework for Android Malware Detection. – In: IEEE Transactions on Network Science and Engineering, Vol. 8, 1 April-June 2021, No 2, pp. 984-994. DOI: 10.1109/TNSE.2020.2996379. Search in Google Scholar

Kakavand, M., D. Mohammad, D. Ali. Application of Machine Learning Algorithms for Android Malware Detection. – In: Proc. of International Conference on Computational Intelligence and Intelligent Systems (CIIS’18), Phuket, Thailand, 17-19 November 2018, pp. 32-36. Search in Google Scholar

Lopes, J., C. Serrao, L. Nunes, A. Almeida, J. Oliveira. Overview of Machine Learning Methods for Android Malware Identification. – In: Proc. of 7th IEEE International Symposium on Digital Forensics and Security (ISDFS’19), Barcelos, Portugal, 10-12 June 2019, pp. 1-6. Search in Google Scholar

Alzubaidi, A. Recent Advances in Android Mobile Malware Detection: A Systematic Literature Review. – In: IEEE Access, Vol. 9, 2021, pp. 146318-146349. DOI: 10.1109/ACCESS.2021.3123187. Search in Google Scholar

Kato, H., T. Sasaki, I. Sasase. Android Malware Detection Based on Composition Ratio of Permission Pairs. – In: IEEE Access, Vol. 9, 2021, pp. 130006-130019. DOI: 10.1109/ACCESS.2021.3113711. Search in Google Scholar

Wang, Z., J. Cai, S. Cheng, M. Li. DroidDeepLearner: Identifying Android Malware Using Deep Learning. – In: Proc. of 37th IEEE Sarnoff Symposium, Newark, NJ, USA, 19-21 September, pp. 160-165. Search in Google Scholar

Li, C., et al. Backdoor Attack on Machine Learning Based Android Malware Detectors. – In: IEEE Transactions on Dependable and Secure Computing, July 2021. DOI: 10.1109/TDSC.2021.3094824. Search in Google Scholar

Gong, L., Z. Li, H. Wang, H. Lin, X. Ma, Y. Liu. Overlay-Based Android Malware Detection at Market Scales: Systematically Adapting to the New Technological Landscape. – In: IEEE Transactions on Mobile Computing. DOI: 10.1109/TMC.2021.3079433. Search in Google Scholar

Surendran, R., T. Thomas, S. Emmanuel. GSDroid: Graph Signal Based Compact Feature Representation for Android Malware Detection. – Expert Systems with Applications, 2020, 113581. Search in Google Scholar

Mahindru, A., A. L. Sangal. MLDroid – Framework for Android Malware Detection Using Machine Learning Techniques. – Neural Computing and Applications, 2020, pp. 1-58. Search in Google Scholar

Martinelli, F., et al. Model Checking and Machine Learning Techniques for Humming Bad Mobile Malware Detection and Mitigation. – Simulation Modelling Practice and Theory, Vol. 105, 2020, 102169. Search in Google Scholar

Almomani, I., et al. Android Ransomware Detection Based on a Hybrid Evolutionary Approach in the Context of Highly Imbalanced Data. – In: IEEE Access, Vol. 9, 2021, pp. 57674-57691. DOI: 10.1109/ACCESS.2021.3071450. Search in Google Scholar

Mercaldo, F., A. Santone. Formal Equivalence Checking for Mobile Malware Detection and Family Classification. – In: IEEE Transactions on Software Engineering. DOI: 10.1109/TSE.2021.3067061. Search in Google Scholar

Vu, L. N., S. Jung. AdMat: A CNN-on-Matrix Approach to Android Malware Detection and Classification. – In: IEEE Access, Vol. 9, 2021, pp. 39680-39694. DOI: 10.1109/ACCESS.2021.3063748. Search in Google Scholar

Gong, L., et al. Systematically Landing Machine Learning onto Market-Scale Mobile Malware Detection. – In: IEEE Transactions on Parallel and Distributed Systems, Vol. 32, 1 July 2021, No 7, pp. 1615-1628. DOI: 10.1109/TPDS.2020.3046092. Search in Google Scholar

Yuan, W., Y. Jiang, H. Li, M. Cai. A Lightweight On-Device Detection Method for Android Malware. – In: IEEE Transactions on Systems, Man, and Cybernetics: Systems, Vol. 51, September 2021, No 9, pp. 5600-5611. DOI: 10.1109/TSMC.2019.2958382. Search in Google Scholar

Liu, K., S. Xu, G. Xu, M. Zhang, D. Sun, H. Liu. A Review of Android Malware Detection Approaches Based on Machine Learning. – In: IEEE Access, Vol. 8, 2020, pp. 124579-124607. DOI: 10.1109/ACCESS.2020.3006143. Search in Google Scholar

Li, D., Q. Li. Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection. – In: IEEE Transactions on Information Forensics and Security, Vol. 15, 2020, pp. 3886-3900. DOI: 10.1109/TIFS.2020.3003571. Search in Google Scholar

Abdollahzadeh, B., F. Gharehchopogh, S. Mirjalili, M. N. Noraziah. African Vultures Optimization Algorithm: A New Nature-Inspired Metaheuristic Algorithm for Global Optimization Problems. – Computers & Industrial Engineering, 2021. DOI: 10.1016/j.cie.2021.107408. Search in Google Scholar

Enck, W., P. Gilbert, B. Gon Chun, L. P. Cox, J. Jung, P. McDaniel, A. Sheth. Taintdroid: An Information-Flow Tracking System for Real-Time Privacy Monitoring on Smartphones. – In: Proc. of USENIX Symposium on Operating Systems Design and Implementation (OSDI’10), 2010, pp. 393-407. Search in Google Scholar

Yan, L.-K., H. Yin. Droidscope: Seamlessly Reconstructing OS and Dalvik Semantic Views for Dynamic Android Malware Analysis. – In: Proc. of USENIX Security Symposium, 2012. Search in Google Scholar

Mehtab, A., W. B. Shahid, T. Yaqoob et al. AdDroid: Rule-Based Machine Learning Framework for Android Malware Analysis. – Mobile Netw. Appl., Vol. 25, 2020, pp. 180-192. DOI: 10.1007/s11036-019-01248-0. Search in Google Scholar

Vasan, D., M. Alazab, S. Wassan et al. IMCFN: Image-Based Malware Classification Using Fine-Tuned Convolutional Neural Network Architecture. – Comput. Netw., Vol. 171, 2020, 107138. DOI: 10.1016/j.comnet.2020.107138. Search in Google Scholar

Wang, J., Q. Jing, J. Gao et al. SEdroid: A Robust Android Malware Detector Using Selective Ensemble Learning. – IEEE Wirel Commun Netw Conf., 2020, pp. 1-5. DOI: 10.1109/WCNC45663.2020.9120537. Search in Google Scholar

Kumar, P. K., V. Sharma. A Novel Efficient Optimized Machine Learning Approach to Detect Malware Activities in Android Applications. – Multimedica Tools and Application, Vol. 82, April 2023. Search in Google Scholar

Guliashki, V., L. Kirilov, A. Nuzi. Optimization Models and Strategy Approaches Dealing with Economic Crises, Natural Disasters, and Pandemics – An Overview. – Cybernetics and Information Technologies, Vol. 23, 2023, No 4, pp. 3-25. Search in Google Scholar

eISSN:
1314-4081
Lingua:
Inglese
Frequenza di pubblicazione:
4 volte all'anno
Argomenti della rivista:
Computer Sciences, Information Technology