MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "10ea298d-96d0-4fa8-bd4f-b18121f5d59e"}, "_deposit": {"id": "4632", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4632"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4632", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Feature Selection of Android Malware Detection and Analysis", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Mobile malware performs maliciousactivities like stealing private information,sending message SMS, reading contacts canharm by exploiting data. Malware spreadsaround the world infects not only ends usersapplications but also large organizations serviceproviders systems. Android malware isprominent to study the best classifiers that candetect these malwares effectively and accuratelythrough selecting the most suitable permissionbasedfeatures as well as comprehensivecomparison with detecting android malware.This study evaluates five machine learningclassifiers, namely BayesNet,MultilayerPerceptron, Decision Tree, K-nearestneighbour, and RandomaForest. The evaluationwas validated using malware data samples fromthe Android Malware Cantagio. This paperfocused on evaluating the best feature selectionto be employed in the best machine-learningclassifier."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value": []}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourteenth International Conference On Computer Applications (ICCA 2016)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Hein, Chit La Pyae Myo"}, {"subitem_authors_fullname": "Myo, Khin Mar"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2016-02-25"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/271"}, "item_title": "Feature Selection of Android Malware Detection and Analysis", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004632", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "4632", "relation": {}, "relation_version_is_last": true, "title": ["Feature Selection of Android Malware Detection and Analysis"], "weko_shared_id": -1}
Feature Selection of Android Malware Detection and Analysis
http://hdl.handle.net/20.500.12678/0000004632
http://hdl.handle.net/20.500.12678/0000004632