References
- Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu: Deep Learning for Android Malware Defenses: a Systematic Literature Review. ArXiv:2103.05292v1.
- Wang W., Zhao M., Gao Z., Xu G., Xian H., Li Y., Zhang X.: Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and Directions. IEEE Access, vol. 7, pp. 67602-67631 (2019). doi:10.1109/access.2019.2918139.
- Yi Zhang, Yuexiang Yang, Xiaolei Wang: A Novel Android Malware Detection Approach Based on Convolutional Neural Network. In: Proc. of the 2nd International Conference on Cryptography, Security and Privacy, pp. 144-149 (March 2018). https://doi.org/10.1145/3199478.3199492
- Xu Jiang, Baolei Mao, Jun Guan, Xingli Huang: Android Malware Detection Using Fine-Grained Features. Scientific Programming (2020). https://doi.org/10.1155/2020/5190138.
- Abdurrahman Pekta, Tankut Acarman: Deep learning for effective Android malware detection using API call graph embeddings. Soft Computing. https://doi.org/10.1007/s00500-019-03940-5.
- Minghui Cai, Yuan Jiang, Cuiying Gao, Heng Li, Wei Yuan: Learning features from enhanced function call graphs for Android malware detection. Neurocomputing, vol. 423, pp. 301-307 (2021). https://doi.org/10.1016/j.neucom.2020.10.054
- Ali Feizollahm, Nor Badrul Anuar, Rosli Salleh, Guillermo Suarez-Tangil, Steven Furnell: AndroDialysis: Analysis of Android Intent Effectiveness in Malware Dectection. In: 30th IEEE/ACM International Conference on Automated Software Engineering (ASE) (2015).
- P. Faruki, V. Ganmoor, V. Laxmi, M.S. Gaur, A. Bharmal: AndroSimilar: robust statistical feature signature for Android malware detection. In: Proc. of the 6th International Conference on Security of Information and Networks, ACM, pp. 152-159 (2013).
- Asaf Shabtai Uri Kanonov, Yuval Elovici, Chanan Glezer, Yael Weiss: Andromaly: a behavioral malware detection framework for android devices. Journal of Intelligent Information Systems, vol. 38, pp. 161-190 (2012). https://doi.org/10.1007/s10844-010-0148-x
- Dataset android malware permission: https://www.kaggle.com/xwolf12/datasetandroidpermissions
- S.S. Shai, B.D. Shai: Understanding Machine Learning: From Theory to Algorithms. Cambridge University Press (2014).
- JohnShawe-Taylor, ShiliangSun: Kernel Methods and Support Vector Machines. Academic Press Library in Signal Processing, vol. 1, pp. 857-881 (2014). https://doi.org/10.1016/B978-0-12-396502-8.00016-4
- Leo Breiman: Random Forests. Machine Learning, vol. 4(1), pp. 5-32 (2001). https://doi.org/10.1023/A:1022695526916
- Daniel Svozil, Vladimir Kvasnicka, Jiri Pospichal: Introduction to multi-layer feed-forward neural networks. Chemometrics and Intelligent Laboratory Systems, vol. 39(1), pp. 43-62. https://doi.org/10.1016/S0169-7439(97)00061-0
- Zewen Li, Wenjie Yang, Shouheng Peng, Fan Liu: A Survey of Convolutional Neural Networks: Analysis, Applications, and Prospects (2020). ArXiv:2004.02806.
- Keiron O'Shea, Ryan Nash: An Introduction to Convolutional Neural Networks (2015). ArXiv:1511.08458.
- Sepp Hochreiter, Jurgen Schmidhuber: Long Short-Term Memory. Neural Computation, vol. 9(8), pp. 1735-1780 (1997). https://doi.org/10.1162/neco.1997.9.8.1735
- https://www.kaggle.com/razgallah/apps-base
- https://www.kaggle.com/tamirkh/apks-dataset
- https://www.kaggle.com/covaanalyst1/cova-dataset