{"created":"2020-09-01T14:39:22.342720+00:00","id":4389,"links":{},"metadata":{"_buckets":{"deposit":"2d987947-350f-4db8-8ab0-96f6af76dfa8"},"_deposit":{"id":"4389","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4389"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4389","sets":["1582963302567:1597824304333"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Permission Based Anomalous Application Detection on Android Smart Phone","subitem_1551255648112":"en_US"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Android applications are widely used bymillions of users to perform many different activities.Android-based smart phone users can get freeapplications from Android Application Market. But,these applications were not certified by legitimateorganizations and they may contain malwareapplications that can steal private information fromusers. The proposed system develops a permissionbased malware detection to protect the privacy ofandroid smart phone users. This system monitorsvarious permissions obtained from androidapplications and analyses them by using a statisticaltechnique called singular value decomposition (SVD)to estimate the correlations of permissions. Thetraining phase emphasizes on the malware samples(approximately 300) downloaded fromhttps://www.kaggle.com/goorax/static-analysis-ofandroid-malware-of-2017. The proposed systemevaluates the risk level (High, Medium, and Low) ofAndroid applications based on the correlationpatterns of permissions. The system accuracy is 85%for malware applications and goodware applications."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Permissions"},{"interim":"Android applications"},{"interim":"SVD (Singular Value Decomposition)"},{"interim":"Risk level"},{"interim":"Malware"},{"interim":"Goodware"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-10-15"}],"displaytype":"preview","filename":"NJPSC 2019 Proceedings-pages-248-255.pdf","filesize":[{"value":"632 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4389/files/NJPSC 2019 Proceedings-pages-248-255.pdf"},"version_id":"dc2d7725-06b8-43b2-982c-1c0526181ade"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"National Journal of Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Win, Htet Htet"},{"subitem_authors_fullname":"Nway, Zon Nyein"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2019-03"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/2325"},"item_title":"Permission Based Anomalous Application Detection on Android Smart Phone","item_type_id":"21","owner":"1","path":["1597824304333"],"publish_date":"2019-10-15","publish_status":"0","recid":"4389","relation_version_is_last":true,"title":["Permission Based Anomalous Application Detection on Android Smart Phone"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T01:50:15.967075+00:00"}