On Malware Detection on Android Smartphones

Faculty Computer Science Year: 2020
Type of Publication: ZU Hosted Pages:
Authors:
Journal: International Journal for Research in Applied Science & Engineering Technology (IJRASET) IJRASET Volume:
Keywords : , Malware Detection , Android Smartphones    
Abstract:
Smartphones plays an important role in our daily life. They have become a significant part of our daily life. They can be used in many fields such as online banking, online learning, social networking, web browsing, etc. The large increase in the use of smartphones leads to a large increase in generating mobile malware. In this paper, we discuss various mobile malware types and datasets used for mobile malware detection process. We also survey various mobile malware detection techniques. General Terms: Malware, Malware Types, Android, Machine Learning and Android Malware Detection Approaches.
   
     
 
       

Author Related Publications

  • Eman selim, "Evaluating Model Inversion Attack Success Across Neural Architectures in Federated Learning for Malware Classification", Springer Nature, 2025 More
  • Eman selim, "A Survey of Federated Learning Privacy Preservation Techniques for Malicious Behavior Detection", International Association for Digital Transfor mation and Technological Innovation, 2025 More
  • Eman selim, "Privacy-Preserving Federated Learning in Network Intrusion Detection: A Systematic Literature Review", Zagazig University, 2025 More
  • Eman selim, "A Lightweight Android Malware Classifier Using Novel Feature Selection Methods", MDPI, 2020 More
  • Eman selim, "A Comparative Study of Privacy-Preserving Techniques in Federated Learning: A Performance and Security Analysis", MDPI, 2025 More

Department Related Publications

  • Walid Ibrahim Ibrahim Khedr, "Ad-hoc on Demand Authentication Chain Protocol - An Authentication Protocol for Ad-Hoc Networks", Institute for Systems and Technologies of Information, Control and Communication, 2015 More
  • Khalied Mohamed Hosny, "Robust Color Image Hashing Using Quaternion Polar Complex Exponential Transform for Image Authentication", Springer, 2018 More
  • Khalied Mohamed Hosny, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
  • Ehab Roshdy Mohamed, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
  • Asmaa Mohamed Khalid Mohamed Abbas, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
Tweet