Ambekar et al., 2024 - Google Patents
TabLSTMNet: enhancing android malware classification through integrated attention and explainable AIAmbekar et al., 2024
- Document ID
- 16153845682104466483
- Author
- Ambekar N
- Devi N
- Thokchom S
- Yogita
- Publication year
- Publication venue
- Microsystem Technologies
External Links
Snippet
The proliferation of Android applications and their extensive adoption within the smartphone sector has contributed to an upsurge in malware infiltration and exploitation. Vulnerabilities in Android applications include the ability to modify devices remotely, obtain unauthorized …
- 230000002708 enhancing effect 0 title description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Vinayakumar et al. | Robust intelligent malware detection using deep learning | |
Zhu et al. | A few-shot meta-learning based siamese neural network using entropy features for ransomware classification | |
Zhang et al. | Deep learning feature exploration for android malware detection | |
Jian et al. | A novel framework for image-based malware detection with a deep neural network | |
Pektaş et al. | Learning to detect Android malware via opcode sequences | |
Milosevic et al. | Machine learning aided Android malware classification | |
Lu et al. | An efficient combined deep neural network based malware detection framework in 5G environment | |
McGiff et al. | Towards multimodal learning for android malware detection | |
Nasser et al. | DL-AMDet: Deep learning-based malware detector for android | |
Butt et al. | Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study | |
Mahindru et al. | HybriDroid: an empirical analysis on effective malware detection model developed using ensemble methods | |
Karbab et al. | SwiftR: Cross-platform ransomware fingerprinting using hierarchical neural networks on hybrid features | |
Xiao et al. | Latent imitator: Generating natural individual discriminatory instances for black-box fairness testing | |
Lekssays et al. | A Novel Approach for Android Malware Detection and Classification using Convolutional Neural Networks. | |
Galli et al. | Explainability in AI-based behavioral malware detection systems | |
Cohen et al. | Website categorization via design attribute learning | |
Ambekar et al. | TabLSTMNet: enhancing android malware classification through integrated attention and explainable AI | |
Younas et al. | An efficient artificial intelligence approach for early detection of cross-site scripting attacks | |
Sawadogo et al. | DeepMalOb: deep detection of obfuscated android malware | |
Atacak et al. | Android malware detection using hybrid ANFIS architecture with low computational cost convolutional layers | |
Anandhi et al. | Performance evaluation of deep neural network on malware detection: visual feature approach | |
Al-zubidi et al. | Predicting DoS and DDoS attacks in network security scenarios using a hybrid deep learning model | |
Alqahtani | Machine learning techniques for malware detection with challenges and future directions | |
Singla et al. | Privacy Enhancement in Internet of Things (IoT) via mRMR for prevention and avoidance of data leakage | |
Yan et al. | A genetic algorithm based model for Chinese phishing E-commerce websites detection |