|
|
|
|
LEADER |
03661nma a2200877 u 4500 |
001 |
EB002159016 |
003 |
EBX01000000000000001297131 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
230515 ||| eng |
020 |
|
|
|a 9783036571744
|
020 |
|
|
|a 9783036571751
|
020 |
|
|
|a books978-3-0365-7174-4
|
100 |
1 |
|
|a Yerima, Suleiman
|
245 |
0 |
0 |
|a High Accuracy Detection of Mobile Malware Using Machine Learning
|h Elektronische Ressource
|
260 |
|
|
|a Basel
|b MDPI - Multidisciplinary Digital Publishing Institute
|c 2023
|
300 |
|
|
|a 1 electronic resource (226 p.)
|
653 |
|
|
|a machine learning
|
653 |
|
|
|a android botnets
|
653 |
|
|
|a botnet detection
|
653 |
|
|
|a CNN-GRU
|
653 |
|
|
|a image processing
|
653 |
|
|
|a code vulnerability
|
653 |
|
|
|a n/a
|
653 |
|
|
|a malware analysis and detection
|
653 |
|
|
|a polyglots
|
653 |
|
|
|a deep learning
|
653 |
|
|
|a gated recurrent unit
|
653 |
|
|
|a neural networks
|
653 |
|
|
|a email phishing
|
653 |
|
|
|a systematic literature review
|
653 |
|
|
|a steganalysis
|
653 |
|
|
|a phishing detection
|
653 |
|
|
|a salp swarm algorithm
|
653 |
|
|
|a machine learning (ML)
|
653 |
|
|
|a mobile security
|
653 |
|
|
|a ensemble classification
|
653 |
|
|
|a CNN-LSTM
|
653 |
|
|
|a reinforcement learning
|
653 |
|
|
|a Information technology industries / bicssc
|
653 |
|
|
|a static analysis
|
653 |
|
|
|a connection weights
|
653 |
|
|
|a adversarial sample
|
653 |
|
|
|a recurrent neural networks
|
653 |
|
|
|a dense neural networks
|
653 |
|
|
|a security
|
653 |
|
|
|a convolutional neural networks
|
653 |
|
|
|a Monte-Carlo simulation
|
653 |
|
|
|a Histogram of Oriented Gradients
|
653 |
|
|
|a applied machine learning
|
653 |
|
|
|a Android security
|
653 |
|
|
|a malware detection
|
653 |
|
|
|a long short-term memory
|
653 |
|
|
|a hybrid analysis
|
653 |
|
|
|a multilayer perceptron
|
653 |
|
|
|a digital forensic
|
653 |
|
|
|a Android botnets
|
653 |
|
|
|a dynamic analysis
|
653 |
|
|
|a malware
|
653 |
|
|
|a convolutional neural network
|
653 |
|
|
|a optimization
|
653 |
|
|
|a business email compromise (BEC)
|
653 |
|
|
|a steganography
|
653 |
|
|
|a neural network
|
700 |
1 |
|
|a Yerima, Suleiman
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b DOAB
|a Directory of Open Access Books
|
500 |
|
|
|a Creative Commons (cc), https://creativecommons.org/licenses/by/4.0/
|
024 |
8 |
|
|a 10.3390/books978-3-0365-7174-4
|
856 |
4 |
0 |
|u https://www.mdpi.com/books/pdfview/book/7088
|7 0
|x Verlag
|3 Volltext
|
856 |
4 |
2 |
|u https://directory.doabooks.org/handle/20.500.12854/99995
|z DOAB: description of the publication
|
082 |
0 |
|
|a 800
|
082 |
0 |
|
|a 000
|
082 |
0 |
|
|a 600
|
082 |
0 |
|
|a 330
|
520 |
|
|
|a As increasingly sophisticated and evasive malware attacks continue to emerge, more effective detection solutions to tackle the problem are being sought through the application of advanced machine learning techniques. This reprint presents several advances in the field including: a new method of generating adversarial samples through byte sequence feature extraction using deep learning; a state-of-the-art comparative evaluation of deep learning approaches for mobile botnet detection; a novel visualization-based approach that utilizes images for Android botnet detection; a study on the detection of drive-by exploits in images using deep learning; etc. Furthermore, this reprint presents state-of-the-art reviews about machine learning-based detection techniques that will increase researchers' knowledge in the field and enable them to identify future research and development directions.
|