Pavithra et al., 2022 - Google Patents
A comparative study on detection of malware and benign on the internet using machine learning classifiersPavithra et al., 2022
View PDF- Document ID
- 15452253530892051394
- Author
- Pavithra J
- Selvakumara Samy S
- Publication year
- Publication venue
- Mathematical Problems in Engineering
External Links
Snippet
The exponential growth in network usage has opened the way for people who use the Internet to be exploited. A phishing attack is the most effective way to obtain sensitive information about a target individual without their knowledge over the Internet. Phishing …
- 238000001514 detection method 0 title abstract description 18
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6228—Selecting the most significant subset of features
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6288—Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion
- G06K9/6292—Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion of classification results, e.g. of classification results related to same input data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chakraborty et al. | Ec2: Ensemble clustering and classification for predicting android malware families | |
Gera et al. | Dominant feature selection and machine learning‐based hybrid approach to analyze android ransomware | |
Chumachenko | Machine learning methods for malware detection and classification | |
Yerima et al. | High accuracy android malware detection using ensemble learning | |
Bayazit et al. | Malware detection in android systems with traditional machine learning models: a survey | |
Ceschin et al. | Machine learning (in) security: A stream of problems | |
Pavithra et al. | A comparative study on detection of malware and benign on the internet using machine learning classifiers | |
Jannat et al. | Analysis and detection of malware in Android applications using machine learning | |
Jakka | Extracting Malware Threat Patterns on a Mobile Platform | |
Bai et al. | $\sf {DBank} $ DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans | |
KR101605783B1 (en) | Malicious application detecting method and computer program executing the method | |
Shrivastava et al. | Android application behavioural analysis for data leakage | |
Maryam et al. | Chybridroid: A machine learning‐based hybrid technique for securing the edge computing | |
Waheed et al. | Effective and efficient android malware detection and category classification using the enhanced kronodroid dataset | |
Ndagi et al. | Machine learning classification algorithms for adware in android devices: a comparative evaluation and analysis | |
Albishry et al. | An attribute extraction for automated malware attack classification and detection using soft computing techniques | |
Khan et al. | Op2Vec: An Opcode Embedding Technique and Dataset Design for End‐to‐End Detection of Android Malware | |
Ullah et al. | Detection of clone scammers in Android markets using IoT‐based edge computing | |
Seraj et al. | MadDroid: malicious adware detection in Android using deep learning | |
Gurukala et al. | Feature selection using particle swarm optimization and ensemble-based machine learning models for ransomware detection | |
Iturbe-Araya et al. | Enhancing unsupervised anomaly-based cyberattacks detection in smart homes through hyperparameter optimization | |
AlMasri et al. | Detecting Spyware in Android Devices Using Random Forest | |
Bhavan et al. | Android malware detection: A comprehensive review | |
Kumar et al. | A survey of deep learning techniques for malware analysis | |
Nwasra et al. | ANFIS-AMAL: Android Malware Threat Assessment Using Ensemble of ANFIS and GWO |