Cited By
View all- Lim JKwok ZSoon IYong JSong Yuhao SBinte Rosley SBalachandran VVilela JSchulmann HLi N(2024)A-COPILOT: Android Covert Operation for Private Information Lifting and OTP Theft: A study on how Malware Masquerading as Legitimate Applications compromise Security and PrivacyProceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy10.1145/3626232.3658638(155-157)Online publication date: 19-Jun-2024
- Heliyanto PSafitri C(2024)Optimization of Accuracy Using Ensamble Stacking to Detect Android Malware2024 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob)10.1109/APWiMob64015.2024.10792965(50-55)Online publication date: 28-Nov-2024
- Chimezie Obidiagha CRahouti MHayajneh T(2024)DeepImageDroid: A Hybrid Framework Leveraging Visual Transformers and Convolutional Neural Networks for Robust Android Malware DetectionIEEE Access10.1109/ACCESS.2024.348559312(156285-156306)Online publication date: 2024
- Show More Cited By