My Account Log in

1 option

Intelligent mobile malware detection / Tony Thomas, Roopak Surendran and Teenu S. John, Mamoun Alazab.

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Thomas, Tony, author.
John, Teenu S., author.
Surendran, Roopak, author.
Alazab, Mamoun, 1980- author.
Series:
Security, privacy, and trust in mobile communications
Language:
English
Subjects (All):
Mobile communication systems--Security measures.
Mobile communication systems.
Mobile computing--Security measures.
Mobile computing.
Computer crimes--Prevention.
Computer crimes.
Malware (Computer software).
Physical Description:
1 online resource
Edition:
First edition.
Place of Publication:
Boca Raton, FL : CRC Press, 2023.
Summary:
The popularity of Android mobile phones has caused more cybercriminalstocreate malware applications that carry out various malicious activities. The attacks, whichescalatedafter the COVID-19 pandemic, proved there is great importance in protecting Android mobile devices from malware attacks. Intelligent Mobile Malware Detection will teach users how to develop intelligent Android malware detection mechanisms by using various graph and stochastic models. The book begins with an introduction to the Android operating system accompanied by the limitations of the state-of-the-art static malware detection mechanisms as well as a detailed presentation of a hybrid malware detection mechanism. The text then presents four different system call-based dynamic Android malware detection mechanisms using graph centrality measures, graph signal processing and graph convolutional networks. Further, the text shows how most of the Android malware can be detected by checking the presence of a unique subsequence of system calls in its system call sequence. All the malware detection mechanisms presented in the book are based on the authors' recent research. The experiments are conducted with the latest Android malware samples, andthe malware samples are collected from public repositories. The source codes are also provided for easy implementation of the mechanisms. This book will be highly useful to Android malware researchers, developers, students and cyber security professionals to explore and build defense mechanisms against the ever-evolving Android malware.
Notes:
OCLC-licensed vendor bibliographic record.
ISBN:
9781000824971
9781000824988
1000824985
OCLC:
1352948876

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account