Abdullah, 2019 - Google Patents
Android malware detection system using genetic programmingAbdullah, 2019
View PDF- Document ID
- 15878106182200496829
- Author
- Abdullah N
- Publication year
External Links
Snippet
Nowadays, smartphones and other mobile devices are playing a significant role in the way people engage in entertainment, communicate, network, work, and bank and shop online. As the number of mobile phones sold has increased dramatically worldwide, so have the …
- 238000001514 detection method 0 title abstract description 260
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Talal et al. | Comprehensive review and analysis of anti-malware apps for smartphones | |
Singh et al. | A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions | |
Martins et al. | Host-based IDS: A review and open issues of an anomaly detection system in IoT | |
Qamar et al. | Mobile malware attacks: Review, taxonomy & future directions | |
US10924517B2 (en) | Processing network traffic based on assessed security weaknesses | |
Yan et al. | A survey on dynamic mobile malware detection | |
He et al. | Mobile application security: malware threats and defenses | |
Saracino et al. | Madam: Effective and efficient behavior-based android malware detection and prevention | |
Suarez-Tangil et al. | Evolution, detection and analysis of malware for smart devices | |
Damshenas et al. | A survey on malware propagation, analysis, and detection | |
Aldhaheri et al. | Deep learning for cyber threat detection in IoT networks: A review | |
Zaidi et al. | A survey on security for smartphone device | |
Sheeja | Intrusion detection system and mitigation of threats in IoT networks using AI techniques: A review. | |
Hamed et al. | Intrusion detection in contemporary environments | |
Sasi et al. | A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges | |
Akhtar | Malware detection and analysis: Challenges and research opportunities | |
Anwar et al. | Android botnets: a serious threat to android devices. | |
Singh et al. | Botnet‐based IoT network traffic analysis using deep learning | |
Anisetti et al. | Security threat landscape | |
Möller | Threats and threat intelligence | |
Hamzenejadi et al. | Mobile botnet detection: a comprehensive survey | |
Yadav et al. | A review on malware analysis for iot and android system | |
Sfetcu | Advanced Persistent Threats in Cybersecurity–Cyber Warfare | |
Jean-Philippe | Enhancing Computer Network Defense Technologies with Machine Learning and Artificial Intelligence | |
Abdullah | Android malware detection system using genetic programming |