International Journal of Advance Computational Engineering and Networking (IJACEN)
Follow Us On :
current issues
Volume-12,Issue-2  ( Feb, 2024 )
Past issues
  1. Volume-12,Issue-1  ( Jan, 2024 )
  2. Volume-11,Issue-12  ( Dec, 2023 )
  3. Volume-11,Issue-11  ( Nov, 2023 )
  4. Volume-11,Issue-10  ( Oct, 2023 )
  5. Volume-11,Issue-9  ( Sep, 2023 )
  6. Volume-11,Issue-8  ( Aug, 2023 )
  7. Volume-11,Issue-7  ( Jul, 2023 )
  8. Volume-11,Issue-6  ( Jun, 2023 )
  9. Volume-11,Issue-5  ( May, 2023 )
  10. Volume-11,Issue-4  ( Apr, 2023 )

Statistics report
Jun. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 134
Paper Published : 1567
No. of Authors : 4088
  Journal Paper

Paper Title :
Mobile Malware Detection Using Classfication Techniques

Author :Isil Karabey, Onder Coban

Article Citation :Isil Karabey ,Onder Coban , (2016 ) " Mobile Malware Detection Using Classfication Techniques " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 41-44, Volume-4,Issue-4

Abstract : The number of applications for smart mobile devices is steadily growing with the continuous increase in the utilization of these devices. Security vulnerabilities such as seizure of personal information or the use of smart devices in accordance with different purposes by cyber criminals often arises through the installation of malicious applications on smart devices. Therefore, the number of studies in order to identify malware for mobile platforms has increased in recent years. In this study, permission-based model is used to detect the malicious applications on Android which is one of the most widely used mobile operating system. M0Droid data set has been analyzed using the Android application package files and permission-based features extracted from these files. In our work, permission-based model which applied previously across different data sets investigated for M0Droid data set and the experimental results has been expanded. While obtaining results, feature set analyzed using different classification techniques. The results shows that permission-based model is successful on M0Droid data set and Random Forests outperforms another methods. When compared to M0Droid system model, it is obtained much better conclusions depend on success rate. Keywords- Mobile Malware Detection, Permission data, Classification techniques, M0Droid.

Type : Research paper

Published : Volume-4,Issue-4


Copyright: © Institute of Research and Journals

| PDF |
Viewed - 76
| Published on 2016-05-04
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World