Nothing Special   »   [go: up one dir, main page]

Abdullah, 2019 - Google Patents

Android malware detection system using genetic programming

Abdullah, 2019

View PDF
Document ID
15878106182200496829
Author
Abdullah N
Publication year

External Links

Snippet

Nowadays, smartphones and other mobile devices are playing a significant role in the way people engage in entertainment, communicate, network, work, and bank and shop online. As the number of mobile phones sold has increased dramatically worldwide, so have the …
Continue reading at etheses.whiterose.ac.uk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Similar Documents

Publication Publication Date Title
Talal et al. Comprehensive review and analysis of anti-malware apps for smartphones
Singh et al. A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions
Martins et al. Host-based IDS: A review and open issues of an anomaly detection system in IoT
Qamar et al. Mobile malware attacks: Review, taxonomy & future directions
US10924517B2 (en) Processing network traffic based on assessed security weaknesses
Yan et al. A survey on dynamic mobile malware detection
He et al. Mobile application security: malware threats and defenses
Saracino et al. Madam: Effective and efficient behavior-based android malware detection and prevention
Suarez-Tangil et al. Evolution, detection and analysis of malware for smart devices
Damshenas et al. A survey on malware propagation, analysis, and detection
Aldhaheri et al. Deep learning for cyber threat detection in IoT networks: A review
Zaidi et al. A survey on security for smartphone device
Sheeja Intrusion detection system and mitigation of threats in IoT networks using AI techniques: A review.
Hamed et al. Intrusion detection in contemporary environments
Sasi et al. A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges
Akhtar Malware detection and analysis: Challenges and research opportunities
Anwar et al. Android botnets: a serious threat to android devices.
Singh et al. Botnet‐based IoT network traffic analysis using deep learning
Anisetti et al. Security threat landscape
Möller Threats and threat intelligence
Hamzenejadi et al. Mobile botnet detection: a comprehensive survey
Yadav et al. A review on malware analysis for iot and android system
Sfetcu Advanced Persistent Threats in Cybersecurity–Cyber Warfare
Jean-Philippe Enhancing Computer Network Defense Technologies with Machine Learning and Artificial Intelligence
Abdullah Android malware detection system using genetic programming