Author:
Gundla Rajeshwari,Gengaje Sachin R.
Publisher
Springer Nature Singapore
Reference37 articles.
1. J. Li, L. Sun, Q. Yan, Z. Li, W. Srisa-an, H. Ye, Significant permission identification for machine-learning-based android Malware detection. IEEE Trans. Ind. Inf. 14(7), 3216–3225 (2018). https://doi.org/10.1109/TII.2017.2789219
2. O. Aslan, R. Samet, A comprehensive review on malware detection approaches. IEEE Access 8, 6249–6271 (2020). https://doi.org/10.1109/ACCESS.2019.2963724
3. F. Alswaina, K. Elleithy, Android malware family classification and analysis: current status and future directions. Electronics 9(6), 942 (2020)
4. Understanding Android Malware Families. https://www.itworldcanada.com/blog/understanding-android-malware-families-uamf-the-foundations-article-1/441562#:~:text=The%20prominent%20Android%20malware%20categories,banker%2C%20and%20trojan%2Ddropper. Accessed on 13 May 2021
5. B. Amro, Malware detection techniques for mobile devices. Int. J. Mob. Netw. Commun. Telemat. (IJMNCT) 7 (2017)