Unravelling Malware Using Co-Existence Of Features
I tiakina i:
| I whakaputaina i: | The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Conference Proceedings vol. 1 (2024) |
|---|---|
| Kaituhi matua: | |
| Ētahi atu kaituhi: | , , , |
| I whakaputaina: |
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
|
| Ngā marau: | |
| Urunga tuihono: | Citation/Abstract |
| Ngā Tūtohu: |
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3112916554 | ||
| 003 | UK-CbPIL | ||
| 024 | 7 | |a 10.1109/ICAIT61638.2024.10690795 |2 doi | |
| 035 | |a 3112916554 | ||
| 045 | 2 | |b d20240101 |b d20241231 | |
| 084 | |a 228229 |2 nlm | ||
| 100 | 1 | |a Omprakash, B |u Information Science and Engineering Atria Institute of Technology,Bangalore,India | |
| 245 | 1 | |a Unravelling Malware Using Co-Existence Of Features | |
| 260 | |b The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |c 2024 | ||
| 513 | |a Conference Proceedings | ||
| 520 | 3 | |a Conference Title: 2024 Second International Conference on Advances in Information Technology (ICAIT)Conference Start Date: 2024, July 24 Conference End Date: 2024, July 27 Conference Location: Chikkamagaluru, Karnataka, IndiaThis work puts forward machine learning demonstrate depending on co-occurring settled qualities for Mobile adware discovery. Suggested framework suspects Mobile adware asks as aberrant set of occurring permission and application programming interfaces compared to safe apps. For test the premise, we created a novel dataset with occurring permission and application programming interface call on various combination level, specifically the second through fifth levels. The retrieved data of occurring feature in various level were tried on permission alone, application programming interface alone, permission and application programming interface jointly, lastly application programming interface occurrence. For retrieving most pertinent occurring feature, frequently occurring pattern, and association rule method, was utilized. Newly obtained data was derived from Mobile APK sample present in Malgenome Drebin and MalDroid2020 repositories. | |
| 653 | |a Programming | ||
| 653 | |a Information technology | ||
| 653 | |a Application programming interface | ||
| 653 | |a Machine learning | ||
| 653 | |a Social | ||
| 700 | 1 | |a Metan, Jyoti |u Information Science and Engineering Atria Institute of Technology,Bangalore,India | |
| 700 | 1 | |a Konar, Anisha |u Information Science and Engineering Atria Institute of Technology,Bangalore,India | |
| 700 | 1 | |a Patil, Kavitha S |u Information Science and Engineering Atria Institute of Technology,Bangalore,India | |
| 700 | 1 | |a Chiranthan, K K |u Information Science and Engineering Atria Institute of Technology,Bangalore,India | |
| 773 | 0 | |t The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Conference Proceedings |g vol. 1 (2024) | |
| 786 | 0 | |d ProQuest |t Science Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3112916554/abstract/embedded/6A8EOT78XXH2IG52?source=fedsrch |