Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "ce9cadd4-932b-4f2d-aecb-5824e2d29318"}, "_deposit": {"id": "3486", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3486"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3486", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Machine Learning Based Android Malware Detection using Significant Permission Identification", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "The increasing popularity of smartphones andtablets has introduced Android malware which israpidly becoming a potential threat to users. A recentreport indicates the alarming growth rate of Androidmalware in which a new malware is introduced inevery second more precisely in 10 seconds. To againstthis dangerous malware growth, this paper proposesa scalable malware detection system using permissionanalysis behavior that can identify malware appseffectively and efficiently. We propose multi-level ofpruning procedures to identify the most significantpermission instead of extracting all permissions. Thepropose system utilizes supervised classificationmethod in machine-learning to classify differentfamilies of benign and malware apps. We found that22 permissions are significant actually. Ourevaluation finds that the analysis time of using these22 permissions are 4 to 32 times less than using allpermissions. The results show that most of malwareapps are located the unnecessary permission onAndroidManifest.xml to inject the malicious codes inthe apps."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-23"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "ICCA 2019 Proceedings Book-pages-328-334.pdf", "filesize": [{"value": "491 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 491000.0, "url": {"url": "https://meral.edu.mm/record/3486/files/ICCA 2019 Proceedings Book-pages-328-334.pdf"}, "version_id": "696dc6df-2eff-406b-ad21-b531b16506ab"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Seventeenth International Conference on Computer Applications(ICCA 2019)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Kyaw, May Thu"}, {"subitem_authors_fullname": "Kham, Nang Saing Moon"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2019-02-27"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1231"}, "item_title": "Machine Learning Based Android Malware Detection using Significant Permission Identification", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003486", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-23"}, "publish_date": "2019-07-23", "publish_status": "0", "recid": "3486", "relation": {}, "relation_version_is_last": true, "title": ["Machine Learning Based Android Malware Detection using Significant Permission Identification"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Machine Learning Based Android Malware Detection using Significant Permission Identification

http://hdl.handle.net/20.500.12678/0000003486
http://hdl.handle.net/20.500.12678/0000003486
9553579e-0840-4944-9eef-c274f0d6f1a5
ce9cadd4-932b-4f2d-aecb-5824e2d29318
None
Preview
Name / File License Actions
ICCA ICCA 2019 Proceedings Book-pages-328-334.pdf (491 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:02:01.953334
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL