![]() Android malware hackers adopt reverse engineering and repackage benign applications with their malicious code. Every day, thousands of new Android malware applications emerge. The various application markets are facing an exponential growth of Android malware. The rise of obfuscated Android malware and impacts on detection methods. Cite this article Elsersy WF, Feizollah A, Anuar NB. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. Licence This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. ![]() Department of Computer System and Technology/Faculty of Computer Science and Information Technology, Universiti Malaya, Kuala Lumpur, Wilayah Persekutuan Kuala Lumpur, Malaysia DOI 10.7717/peerj-cs.907 Published Accepted Received Academic Editor Muhammad Aleem Subject Areas Data Mining and Machine Learning, Mobile and Ubiquitous Computing, Security and Privacy, Operating Systems Keywords Android malware, Android security, Evasion techniques, Machine learning, Obfuscation techniques Copyright © 2022 Elsersy et al. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |