On mobile malware infections
Abstract
References
Index Terms
- On mobile malware infections
Recommendations
The company you keep: mobile malware infection rates and inexpensive risk indicators
WWW '14: Proceedings of the 23rd international conference on World wide webThere is little information from independent sources in the public domain about mobile malware infection rates. The only previous independent estimate (0.0009%) [11], was based on indirect measurements obtained from domain-name resolution traces. In ...
A comprehensive survey on deep learning based malware detection techniques
AbstractRecent theoretical and practical studies have revealed that malware is one of the most harmful threats to the digital world. Malware mitigation techniques have evolved over the years to ensure security. Earlier, several classical ...
Intelligent mobile malware detection using permission requests and API calls
AbstractMalware is a serious threat that has been used to target mobile devices since its inception. Two types of mobile malware attacks are standalone: fraudulent mobile apps and injected malicious apps. Defending against the cyber threats of ...
Highlights- Effective classification model that combines permission request and API calls.
- ...
Comments
Information & Contributors
Information
Published In

- Conference Chair:
- Gergely Acs,
- General Chairs:
- Andrew Martin,
- Ivan Martinovic,
- Program Chairs:
- Claude Castelluccia,
- Patrick Traynor
Sponsors
In-Cooperation
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Invited-talk
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 376Total Downloads
- Downloads (Last 12 months)3
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in