[go: up one dir, main page]

Pavithra et al., 2022 - Google Patents

A comparative study on detection of malware and benign on the internet using machine learning classifiers

Pavithra et al., 2022

View PDF @Full View
Document ID
15452253530892051394
Author
Pavithra J
Selvakumara Samy S
Publication year
Publication venue
Mathematical Problems in Engineering

External Links

Snippet

The exponential growth in network usage has opened the way for people who use the Internet to be exploited. A phishing attack is the most effective way to obtain sensitive information about a target individual without their knowledge over the Internet. Phishing …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6228Selecting the most significant subset of features
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6288Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion
    • G06K9/6292Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion of classification results, e.g. of classification results related to same input data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run

Similar Documents

Publication Publication Date Title
Chakraborty et al. Ec2: Ensemble clustering and classification for predicting android malware families
Gera et al. Dominant feature selection and machine learning‐based hybrid approach to analyze android ransomware
Chumachenko Machine learning methods for malware detection and classification
Yerima et al. High accuracy android malware detection using ensemble learning
Bayazit et al. Malware detection in android systems with traditional machine learning models: a survey
Ceschin et al. Machine learning (in) security: A stream of problems
Pavithra et al. A comparative study on detection of malware and benign on the internet using machine learning classifiers
Jannat et al. Analysis and detection of malware in Android applications using machine learning
Jakka Extracting Malware Threat Patterns on a Mobile Platform
Bai et al. $\sf {DBank} $ DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans
KR101605783B1 (en) Malicious application detecting method and computer program executing the method
Shrivastava et al. Android application behavioural analysis for data leakage
Maryam et al. Chybridroid: A machine learning‐based hybrid technique for securing the edge computing
Waheed et al. Effective and efficient android malware detection and category classification using the enhanced kronodroid dataset
Ndagi et al. Machine learning classification algorithms for adware in android devices: a comparative evaluation and analysis
Albishry et al. An attribute extraction for automated malware attack classification and detection using soft computing techniques
Khan et al. Op2Vec: An Opcode Embedding Technique and Dataset Design for End‐to‐End Detection of Android Malware
Ullah et al. Detection of clone scammers in Android markets using IoT‐based edge computing
Seraj et al. MadDroid: malicious adware detection in Android using deep learning
Gurukala et al. Feature selection using particle swarm optimization and ensemble-based machine learning models for ransomware detection
Iturbe-Araya et al. Enhancing unsupervised anomaly-based cyberattacks detection in smart homes through hyperparameter optimization
AlMasri et al. Detecting Spyware in Android Devices Using Random Forest
Bhavan et al. Android malware detection: A comprehensive review
Kumar et al. A survey of deep learning techniques for malware analysis
Nwasra et al. ANFIS-AMAL: Android Malware Threat Assessment Using Ensemble of ANFIS and GWO