Survey of Mobile Malware Analysis, Detection Techniques and Tool
dc.contributor.author | Gyamfi, N.K. | |
dc.contributor.author | Owusu, E. | |
dc.date.accessioned | 2019-06-04T11:28:11Z | |
dc.date.available | 2019-06-04T11:28:11Z | |
dc.date.issued | 2018-11 | |
dc.description.abstract | The rapid increase in the use of smartphones, has contributed to the increase in mobile attackers. In most situations deceitful applications are infected with malicious contents to cause harm to both the hardware and the software. These malicious programs or malware are usually designed to disrupt or gather information from the device. By attempts to curtail these problems various techniques are proposed. This paper attempts to analyze the most popular and recent techniques and suggests which is better. | en_US |
dc.identifier.other | DOI: 10.1109/IEMCON.2018.8614895 | |
dc.identifier.uri | http://ugspace.ug.edu.gh/handle/123456789/30495 | |
dc.language.iso | en | en_US |
dc.publisher | 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference, IEMCON 2018 | en_US |
dc.subject | Mobile phone | en_US |
dc.subject | Mobile malware | en_US |
dc.subject | Static detection | en_US |
dc.subject | Dynamic detection | en_US |
dc.subject | Hybrid detection | en_US |
dc.title | Survey of Mobile Malware Analysis, Detection Techniques and Tool | en_US |
dc.type | Article | en_US |
Files
Original bundle
1 - 1 of 1
- Name:
- Survey of Mobile Malware Analysis, Detection Techniques and Tool.pdf
- Size:
- 303.17 KB
- Format:
- Adobe Portable Document Format
- Description:
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.6 KB
- Format:
- Item-specific license agreed upon to submission
- Description: