High Accuracy Detection of Mobile Malware Using Machine Learning
As increasingly sophisticated and evasive malware attacks continue to emerge, more effective detection solutions to tackle the problem are being sought through the application of advanced machine learning techniques. This reprint presents several advances in the field including: a new method of gene...
Format: | eBook |
---|---|
Language: | English |
Published: |
Basel
MDPI - Multidisciplinary Digital Publishing Institute
2023
|
Subjects: | |
Online Access: | Open Access: DOAB: description of the publication Open Access: DOAB, download the publication |
LEADER | 03894namaa2200937uu 4500 | ||
---|---|---|---|
001 | doab99995 | ||
003 | oapen | ||
005 | 20230511 | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 230511s2023 xx |||||o ||| 0|eng d | ||
020 | |a 9783036571744 | ||
020 | |a 9783036571751 | ||
020 | |a books978-3-0365-7174-4 | ||
024 | 7 | |a 10.3390/books978-3-0365-7174-4 |2 doi | |
040 | |a oapen |c oapen | ||
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a KNTX |2 bicssc | |
720 | 1 | |a Yerima, Suleiman |4 edt | |
720 | 1 | |a Yerima, Suleiman |4 oth | |
245 | 0 | 0 | |a High Accuracy Detection of Mobile Malware Using Machine Learning |
260 | |a Basel |b MDPI - Multidisciplinary Digital Publishing Institute |c 2023 | ||
300 | |a 1 online resource (226 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |f Unrestricted online access |2 star | |
520 | |a As increasingly sophisticated and evasive malware attacks continue to emerge, more effective detection solutions to tackle the problem are being sought through the application of advanced machine learning techniques. This reprint presents several advances in the field including: a new method of generating adversarial samples through byte sequence feature extraction using deep learning; a state-of-the-art comparative evaluation of deep learning approaches for mobile botnet detection; a novel visualization-based approach that utilizes images for Android botnet detection; a study on the detection of drive-by exploits in images using deep learning; etc. Furthermore, this reprint presents state-of-the-art reviews about machine learning-based detection techniques that will increase researchers' knowledge in the field and enable them to identify future research and development directions. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by/4.0/ |2 cc |u https://creativecommons.org/licenses/by/4.0/ | ||
546 | |a English | ||
650 | 7 | |a Information technology industries |2 bicssc | |
653 | |a adversarial sample | ||
653 | |a android botnets | ||
653 | |a Android botnets | ||
653 | |a Android security | ||
653 | |a applied machine learning | ||
653 | |a botnet detection | ||
653 | |a business email compromise (BEC) | ||
653 | |a CNN-GRU | ||
653 | |a CNN-LSTM | ||
653 | |a code vulnerability | ||
653 | |a connection weights | ||
653 | |a convolutional neural network | ||
653 | |a convolutional neural networks | ||
653 | |a deep learning | ||
653 | |a dense neural networks | ||
653 | |a digital forensic | ||
653 | |a dynamic analysis | ||
653 | |a email phishing | ||
653 | |a ensemble classification | ||
653 | |a gated recurrent unit | ||
653 | |a Histogram of Oriented Gradients | ||
653 | |a hybrid analysis | ||
653 | |a image processing | ||
653 | |a long short-term memory | ||
653 | |a machine learning | ||
653 | |a machine learning (ML) | ||
653 | |a malware | ||
653 | |a malware analysis and detection | ||
653 | |a malware detection | ||
653 | |a mobile security | ||
653 | |a Monte-Carlo simulation | ||
653 | |a multilayer perceptron | ||
653 | |a n/a | ||
653 | |a neural network | ||
653 | |a neural networks | ||
653 | |a optimization | ||
653 | |a phishing detection | ||
653 | |a polyglots | ||
653 | |a recurrent neural networks | ||
653 | |a reinforcement learning | ||
653 | |a salp swarm algorithm | ||
653 | |a security | ||
653 | |a static analysis | ||
653 | |a steganalysis | ||
653 | |a steganography | ||
653 | |a systematic literature review | ||
793 | 0 | |a DOAB Library. | |
856 | 4 | 0 | |u https://directory.doabooks.org/handle/20.500.12854/99995 |7 0 |z Open Access: DOAB: description of the publication |
856 | 4 | 0 | |u https://mdpi.com/books/pdfview/book/7088 |7 0 |z Open Access: DOAB, download the publication |