Unravelling Malware Using Co-Existence Of Features

I tiakina i:
Ngā taipitopito rārangi puna kōrero
I whakaputaina i:The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Conference Proceedings vol. 1 (2024)
Kaituhi matua: Omprakash, B
Ētahi atu kaituhi: Metan, Jyoti, Konar, Anisha, Patil, Kavitha S, Chiranthan, K K
I whakaputaina:
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Ngā marau:
Urunga tuihono:Citation/Abstract
Ngā Tūtohu: Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!

MARC

LEADER 00000nab a2200000uu 4500
001 3112916554
003 UK-CbPIL
024 7 |a 10.1109/ICAIT61638.2024.10690795  |2 doi 
035 |a 3112916554 
045 2 |b d20240101  |b d20241231 
084 |a 228229  |2 nlm 
100 1 |a Omprakash, B  |u Information Science and Engineering Atria Institute of Technology,Bangalore,India 
245 1 |a Unravelling Malware Using Co-Existence Of Features 
260 |b The Institute of Electrical and Electronics Engineers, Inc. (IEEE)  |c 2024 
513 |a Conference Proceedings 
520 3 |a Conference Title: 2024 Second International Conference on Advances in Information Technology (ICAIT)Conference Start Date: 2024, July 24 Conference End Date: 2024, July 27 Conference Location: Chikkamagaluru, Karnataka, IndiaThis work puts forward machine learning demonstrate depending on co-occurring settled qualities for Mobile adware discovery. Suggested framework suspects Mobile adware asks as aberrant set of occurring permission and application programming interfaces compared to safe apps. For test the premise, we created a novel dataset with occurring permission and application programming interface call on various combination level, specifically the second through fifth levels. The retrieved data of occurring feature in various level were tried on permission alone, application programming interface alone, permission and application programming interface jointly, lastly application programming interface occurrence. For retrieving most pertinent occurring feature, frequently occurring pattern, and association rule method, was utilized. Newly obtained data was derived from Mobile APK sample present in Malgenome Drebin and MalDroid2020 repositories. 
653 |a Programming 
653 |a Information technology 
653 |a Application programming interface 
653 |a Machine learning 
653 |a Social 
700 1 |a Metan, Jyoti  |u Information Science and Engineering Atria Institute of Technology,Bangalore,India 
700 1 |a Konar, Anisha  |u Information Science and Engineering Atria Institute of Technology,Bangalore,India 
700 1 |a Patil, Kavitha S  |u Information Science and Engineering Atria Institute of Technology,Bangalore,India 
700 1 |a Chiranthan, K K  |u Information Science and Engineering Atria Institute of Technology,Bangalore,India 
773 0 |t The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Conference Proceedings  |g vol. 1 (2024) 
786 0 |d ProQuest  |t Science Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3112916554/abstract/embedded/6A8EOT78XXH2IG52?source=fedsrch