Publisher
Springer Nature Switzerland
Reference15 articles.
1. Felt, A.P., Greenwood, K., Wagner, D.: The effectiveness of install-time permission systems for third-party applications (2010)
2. Abawajy, J., Darem, A., Alhashmi, A.A.: Feature subset selection for malware detection in smart IoT platforms. Sensors 21(4), 1374 (2021)
3. Agarwal, A., Khari, M., Singh, R.: Detection of DDOS attack using deep learning model in cloud storage application. Wireless Pers. Commun. (2021). https://doi.org/10.1007/s11277-021-08271-z
4. Aung, Z., Zaw, W.: Permission-based Android malware detection. Int. J. Sci. Technol. Res. 2(3), 228–234 (2013)
5. Sarma, B.P., Li, N., Gates, C., Potharaju, R., Nita-Rotaru, C., Molloy, I.: Android permissions: a perspective combining risks and benefits (2012)