Malicious code detection in android: the role of sequence characteristics and disassembling methods (English)
Free access
- New search for: Balikcioglu, Pinar G.
- New search for: Sirlanci, Melih
- New search for: A. Kucuk, Ozge
- New search for: Ulukapi, Bulut
- New search for: Turkmen, Ramazan K.
- New search for: Acarturk, Cengiz
- Further information on Acarturk, Cengiz:
- https://orcid.org/0000-0002-5443-6868
- New search for: Balikcioglu, Pinar G.
- New search for: Sirlanci, Melih
- New search for: A. Kucuk, Ozge
- New search for: Ulukapi, Bulut
- New search for: Turkmen, Ramazan K.
- New search for: Acarturk, Cengiz
- Further information on Acarturk, Cengiz:
- https://orcid.org/0000-0002-5443-6868
In:
International Journal of Information Security
;
22
, 1
; 107-118
;
2022
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Malicious code detection in android: the role of sequence characteristics and disassembling methods
-
Contributors:Balikcioglu, Pinar G. ( author ) / Sirlanci, Melih ( author ) / A. Kucuk, Ozge ( author ) / Ulukapi, Bulut ( author ) / Turkmen, Ramazan K. ( author ) / Acarturk, Cengiz ( author )
-
Published in:International Journal of Information Security ; 22, 1 ; 107-118
-
Publisher:
- New search for: Springer Berlin Heidelberg
- New search for: Springer
-
Place of publication:Heidelberg
-
Publication date:2022
-
ISSN:
-
ZDBID:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
- New search for: 54.38$jComputersicherheit / 54.38
- Further information on Basic classification
-
Keywords:
-
Classification:
BKL: 54.38$jComputersicherheit / 54.38 Computersicherheit -
Source:
Table of contents – Volume 22, Issue 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Intrusion detection system over real-time data traffic using machine learning methods with feature selection approachesSah, Gulab / Banerjee, Subhasish / Singh, Sweety et al. | 2022
- 29
-
Gridchain: an investigation of privacy for the future local distribution gridPicazo-Sanchez, Pablo / Almgren, Magnus et al. | 2022
- 47
-
A deep learner model for multi-language webshell detectionHannousse, Abdelhakim / Nait-Hamoud, Mohamed Cherif / Yahiouche, Salima et al. | 2022
- 63
-
Modeling reporting delays in cyber incidents: an industry-level comparisonSangari, Seema / Dallal, Eric / Whitman, Michael et al. | 2022
- 77
-
Early web application attack detection using network traffic analysisRajić, Branislav / Stanisavljević, Žarko / Vuletić, Pavle et al. | 2022
- 93
-
Restricting data-leakage using fine-grained access control on OSN objectsRathore, Nemi Chandra / Tripathy, Somanath et al. | 2022
- 107
-
Malicious code detection in android: the role of sequence characteristics and disassembling methodsBalikcioglu, Pinar G. / Sirlanci, Melih / A. Kucuk, Ozge / Ulukapi, Bulut / Turkmen, Ramazan K. / Acarturk, Cengiz et al. | 2022
- 119
-
A novel approach for detection of APT malware using multi-dimensional hybrid Bayesian belief networkSharma, Amit / Gupta, Brij B. / Singh, Awadhesh Kumar / Saraswat, V. K. et al. | 2022
- 137
-
Mobile botnet detection: a comprehensive surveyHamzenejadi, Sajad / Ghazvini, Mahdieh / Hosseini, Seyedamiryousef et al. | 2022
- 177
-
A review on fake news detection 3T’s: typology, time of detection, taxonomiesRastogi, Shubhangi / Bansal, Divya et al. | 2022
- 213
-
PatrIoT: practical and agile threat research for IoTSüren, Emre / Heiding, Fredrik / Olegård, Johannes / Lagerström, Robert et al. | 2022
- 235
-
Deep SARSA-based reinforcement learning approach for anomaly network intrusion detection systemMohamed, Safa / Ejbali, Ridha et al. | 2022
- 249
-
Cyber risk management for autonomous passenger ships using threat-informed defense-in-depthAmro, Ahmed / Gkioulos, Vasileios et al. | 2022
- 289
-
User identification using deep learning and human activity mobile sensor dataAlawneh, Luay / Al-Zinati, Mohammad / Al-Ayyoub, Mahmoud et al. | 2022
- 303
-
Correction to: A decentralized honeypot for IoT Protocols based on Android devicesLygerou, Irini / Srinivasa, Shreyas / Vasilomanolakis, Emmanouil / Stergiopoulos, George / Gritzalis, Dimitris et al. | 2022