Have a personal or library account? Click to login
Improving mobile security: A study on android malware detection using LOF Cover

Improving mobile security: A study on android malware detection using LOF

By: Luay Albtosh and  Marwan Omar  
Open Access
|Sep 2024

References

  1. Kinoon M.A., Omar M., Mohaisen M., Mohaisen D., Security breaches in the healthcare domain: a spatiotemporal analysis, Computational Data and Social Networks: 10th International Conference, CSoNet 2021, Virtual, 15–17 November 2021, Proceedings 10, 171–183, Springer, 2021.
  2. Omar M., New Threats and Countermeasures in Digital Crime and Cyber Terrorism (Chapter: Insider threats detecting and controlling malicious insiders), 162–172, 2015.
  3. Omar M., Machine Learning for Cybersecurity: Innovative Deep Learning Solutions (1st Ed.), Springer, 2022.
  4. Omar M., VulDefend: A novel technique based on pattern–exploiting training for detecting software vulnerabilities using language models, 2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology, 22–24 May 2023, Amman, Jordan.
  5. Omar M., Jones R., Burrell D.N., Dawson M., Nobles C., Mohammed D., Bashir A.K., Transformational Interventions for Business, Technology and Healthcare (Chapter 7: Harnessing the power and simplicity of decision trees to detect IoT malware), 215–229, IGI Global, 2023.
  6. Statista. (n.d.), Global smartphone OS market share of Android, https://www.statista.com/statistics/236027/global-smartphone-os-market-share-of-android/, Accessed: December 15, 2023.
  7. Zhou Y., Jiang X., Dissecting android malware: Characterization and evolution, 2012 IEEE Symposium on Security and Privacy, 20–23 May 2012, San Francisco, California, USA.
  8. Felt A.P., Chin E., Hanna S., Song D., Wagner D., Android permissions demystified, Proceedings of the 18th ACM Conference on Computer and Communications Security, 17–21 October 2011, Chicago, Illinois, USA.
  9. Omar M., Smartphone security: Defending Android-based smartphone against emerging malware attacks, (PhD Thesis), Colorado Technical University, USA, 2012.
  10. Omar M., Dawson M., Research in progress-defending android smartphones from malware attacks, 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT), 288–292, IEEE, 2013.
  11. Banisakher M., Omar M., A world of cyber attacks (a survey), KSU Proceedings on Cybersecurity Education, Research and Practice, 7, 1–6, 2019.
  12. Omar M., Mohammed D., Nguyen V., Dawson M., Banisakher M., Research Anthology on Securing Mobile Technologies and Applications (Chapter 34: Android application security), 610–625, IGI Global, 2021.
  13. Faruki P., Bharmal A., Laxmi V., Ganmoor V., Gaur M.S., Conti M., Rajarajan M., Android security: a survey of issues malware penetration and defenses, IEEE Communications Surveys and Tutorials, 17(2), 998–1022, 2015.
  14. Mohammed D., Omar M., Nguyen V., Security Solutions for Hyperconnectivity and The Internet of Things (Chapter 5: Enhancing cyber security for financial industry through compliance and regulatory standards), 17, 113–129, 2017.
  15. Mohammed D., Omar M., Nguyen V., Wireless sensor network security: approaches to detecting and avoiding wormhole attacks, Journal of Research in Business Economics and Management, 10(2), 1860–1864, 2018.
  16. Ayub M.F., Li X., Mahmood K., Shamshad S., Saleem M.A., Omar M., Secure consumer-centric demand response management in resilient smart grid as industry 5.0 application with blockchain-based authentication, IEEE Transactions on Consumer Electronics, 1–10, 2023.
  17. Dawson M., Omar M., Eltayeb M., Security Solutions for Hyperconnectivity and the Internet of Things, IGI Global, 2016.
  18. Dawson M., Omar M., Abramson J., Leonard B., Bessette D., Developing Next-Generation Countermeasures for Homeland Security Threat Prevention (Chapter 10: Battlefield cyberspace: Exploitation of hyperconnectivity and internet of things), 204–235, 2017.
  19. Gholami S., Omar M., Can a student large language model perform as well as it's teacher?, arXiv:2310.02421, 2023.
  20. Omar M., Developing cybersecurity education capabilities at Iraqi universities, 16th Annual Conference of the Midwest Association for Information Systems, 10, 2021.
  21. Omar M., Choi S., Nyang D., Mohaisen D., Quantifying the performance of adversarial training on language models with distribution shifts, 1st Workshop on Cybersecurity and Social Sciences, 30 May 2022, Nagasaki, Japan.
  22. Omar M., Choi S., Nyang D., Mohaisen D., Robust natural language processing: Recent advances challenges and future directions, IEEE Access, 10, 86038–86056, 2022.
  23. Omar M., Sukthankar G., Text-defend: Detecting adversarial examples using local outlier factor, 2023 IEEE 17th International Conference on Semantic Computing, 01–03 February 2023, California, USA.
  24. Saleem M.A., Li X., Mahmood K., Shamshad S., Ayub M.F., Bashir A.K., Omar M., Provably secure conditional-privacy access control protocol for intelligent customers-centric communication in VANET, IEEE Transactions on Consumer Electronics, DOI: 10.1109/TCE.2023.3324273, 2023.
  25. Zhou S., Ali A., Al-Fuqaha A., Omar M., Feng L., Robust risk-sensitive task offloading for edge-enabled industrial internet of things, IEEE Transactions on Consumer Electronics, DOI: 10.1109/TCE.2023.3323146, 2023.
  26. Breunig M.M., Kriegel H.P., Raymond T.N., Sander J., LOF: identifying density-based local outliers, Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, 15–18 May 2000, Texas, USA.
  27. Arp D., Spreitzenbarth M., Hubner M., Gascon H., Rieck K., Drebin: Effective and explainable detection of android malware in your pocket, Proceedings of the Network and Distributed System Security Symposium, Internet Society, 23–26 February 2014, San Diego, California, USA.
Language: English
Page range: 241 - 252
Submitted on: Nov 5, 2023
Accepted on: May 1, 2024
Published on: Sep 18, 2024
Published by: Harran University
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2024 Luay Albtosh, Marwan Omar, published by Harran University
This work is licensed under the Creative Commons Attribution 4.0 License.