UPSI Digital Repository (UDRep)
|
|
|
Abstract : Universiti Pendidikan Sultan Idris |
The new and disruptive technologies for ensuring smartphone security are very limited and largely scattered. The available options and gaps in this research area must be analysed to provide valuable insights about the present technological environment. This work illustrates the research landscape by mapping the existing literature to a comprehensive taxonomy with four categories. The frst category includes review and survey articles related to smartphone security. The second category includes papers on smartphone security solutions. The third category includes smartphone malware studies that examine the security aspects of smartphones and the threats posed by malware. The fourth category includes ranking, clustering and classifcation studies that classify malware based on their families or security risk levels. Several smartphone security apps have also been analysed and compared based on their mechanisms to identify their contents and distinguishing features by using several evaluation metrics and parameters. Two malware detection techniques, namely, machine-learning-based and non-machine-learning-based malware detection, are drawn from the review. The basic characteristics of this emerging feld of research are discussed in the following aspects: (1) motivation behind the development of security measures for diferent smartphone operating system (Oss), (2) open challenges that compromise the usability and personal information of users and (3) recommendations for enhancing smartphone security. This work also reviews the functionalities and services of several anti-malware companies to fully reveal their security mechanisms, features and strategies. This work also highlights the open challenges and issues related to the evaluation and benchmarking of malware detection techniques to identify the best malware detection apps for smartphones
|
References |
1. Wu, S., Wang, P., Li, X., & Zhang, Y. (2016). Efective detection of android malware based on the usage of data fow APIs and machine learning. Information and Software Technology, 75, 17–25. 2. Sharma, K., & Gupta, B. (2016). Multi-layer defense against malware attacks on smartphone Wi-Fi access channel. Procedia Computer Science, 78, 19–25. 3. Farina, P., Cambiaso, E., Papaleo, G., & Aiello, M. (2016). Are mobile botnets a possible threat? The case of SlowBot Net. Computers & Security, 58, 268–283. 4. Do, Q., Martini, B., & Choo, K.-K. R. (2015). Exfltrating data from Android devices. Computers & Security, 48, 74–91. 5. Delac, G., Silic, M., & Krolo, J. (2011). Emerging security threats for mobile platforms. In MIPRO, 2011 proceedings of the 34th international convention, 2011 (pp. 1468–1473). 6. Mikhaylov, D., Zhukov, I., Starikovskiy, A., Kharkov, S., Tolstaya, A., & Zuykov, A. (2013). Review of malicious mobile applications, phone bugs and other cyber threats to mobile devices. In 2013 5th IEEE international conference on broadband network & multimedia technology (IC-BNMT) (pp.302–305). 7. Khan, J., Abbas, H., & Al-Muhtadi, J. (2015). Survey on mobile user’s data privacy threats and defense mechanisms. Procedia Computer Science, 56, 376–383. 8. Eslahi, M., Rostami, M. R., Hashim, H., Tahir, N., & Naseri, M. V. (2014). A data collection approach for Mobile Botnet analysis and detection. In 2014 IEEE symposium on wireless technology and applications (ISWTA) (pp. 199–204). 9. Amamra, A., Talhi, C., & Robert, J. M. (2012). Smartphone malware detection: From a survey towards taxonomy. In 2012 7th international conference on malicious and unwanted software (MALWARE) (pp. 79–86). 10. Arshad, S., Shah, M. A., Khan, A., & Ahmed, M. (2016). Android malware detection and protection: A survey. International Journal of Advanced Computer Science and Applications, 7, 463–475. 11. Tam, K., Feizollah, A., Anuar, N. B., Salleh, R., & Cavallaro, L. (2017). The evolution of android malware and android analysis techniques. ACM Computing Surveys (CSUR), 49(4), 76. 12. Feizollah, A., Anuar, N. B., Salleh, R., & Wahab, A. W. A. (2015). A review on feature selection in mobile malware detection. Digital Investigation, 13, 22–37. 13. Peng, S., Yu, S., & Yang, A. (2014). Smartphone malware and its propagation modeling: A survey. IEEE Communications Surveys & Tutorials, 16, 925–941. 14. Delosières, L., & García, D. (2013). Infrastructure for detecting Android malware. In E. Gelenbe & R. Lent (Eds.), Information sciences and systems 2013, Lecture Notes in Electrical Engineering, (vol. 264). Cham: Springer. 15. Karim, A., Shah, S. A. A., Salleh, R. B., Arif, M., Noor, R. M., & Shamshirband, S. (2015). Mobile botnet attacks-an emerging threat: Classification, review and open issues. TIIS, 9, 1471–1492. 16. Meshram, P. D., & Thool, R. C. (2014). A survey paper on vulnerabilities in android OS and security of android devices. In 2014 IEEE global conference on wireless computing and networking (GCWCN) (pp. 174–178). 17. Hsieh, W. C., Wu, C. C., & Kao, Y. W. (2015). A study of android malware detection technology evolution. In 2015 international Carnahan conference on security technology (ICCST) (pp. 135–140). 18. Baykara, M., & Çolak, E. (2018). A review of cloned mobile malware applications for android devices. In 2018 6th international symposium on digital forensic and security (ISDFS) (pp. 1–5). 19. Turkanovi?, M., & Polan?i?, G. (2013). On the security of certain e-communication types: Risks, user awareness and recommendations. Journal of Information Security and Applications, 18, 193–205. 20. Fang, Z., Han, W., & Li, Y. (2014). Permission based Android security: Issues and countermeasures. Computers & Security, 43, 205–218. 21. Silva, S. S. C., Silva, R. M. P., Pinto, R. C. G., & Salles, R. M. (2013). Botnets: A survey. Computer Networks, 57, 378–403. 22. Eshmawi, A., & Nair, S. (2013). Smartphone applications security: Survey of new vectors and solutions. In 2013 ACS international conference on computer systems and applications (AICCSA) (pp. 1–4). 23. Zachariah, R., Akash, K., Yousef, M. S., & Chacko, A. M. (2017). Android malware detection a survey. In 2017 IEEE international conference on circuits and systems (ICCS) (pp. 238–244). 24. Kalpana, S., & Karthikeyan, S. (2017). A survey on rise of mobile malware and detection methods. In 2017 international conference on innovations in information, embedded and communication systems (ICIIECS) (pp. 1–5). 25. Ahvanooey, M. T., Li, Q., Rabbani, M., & Rajput, A. R. (2017). A survey on smartphones security: Software vulnerabilities, malware, and attacks. International Journal of Advanced Computer Science and Applications, 8, 30–45. 26. Sarmah, U., Bhattacharyya, D. K., & Kalita, J. K. (2018). A survey of detection methods for XSS attacks. Journal of Network and Computer Applications, 118, 113–143. 27. Mollah, M. B., Azad, M. A. K., & Vasilakos, A. (2017). Security and privacy challenges in mobile cloud computing: Survey and way ahead. Journal of Network and Computer Applications, 84, 38–54. 28. Ab Razak, M. F., Anuar, N. B., Salleh, R., & Firdaus, A. (2016). The rise of “malware”: Bibliometric analysis of malware study. Journal of Network and Computer Applications, 75, 58–76. 29. Safavi, S., Shukur, Z., & Razali, R. (2013). Reviews on cybercrime affecting portable devices. Procedia Technology, 11, 650–657. 30. Song, Y., Zhu, X., Hong, Y., Zhang, H., & Tan, H. (2012). A mobile communication honeypot observing system. In 2012 fourth international conference on multimedia information networking and security (pp. 861–865) 31. Shankar, V. G., & Somani, G. (2016). Anti-Hijack: Runtime detection of malware initiated hijacking in android. Procedia Computer Science, 78, 587–594. 32. Choi, J., Sung, W., Choi, C., & Kim, P. (2015). Personal information leakage detection method using the inference-based access control model on the Android platform. Pervasive and MobileComputing, 24, 138–149. 33. Kumar Thanigaivelan, N., Nigussie, E., Hakkala, A., Virtanen, S., & Isoaho, J. (2018). CoDRA: Context-based dynamically reconfgurable access control system for android. Journal of Network and Computer Applications, 101, 1–17. 34. Zeferer, T., & Teuf, P. (2013). Policy-based security assessment of mobile end-user devices an alternative to mobile device management solutions for Android smartphones. In 2013 international conference on security and cryptography (SECRYPT) (pp. 1–8). 35. Armando, A., Merlo, A., & Verderame, L. (2014). Security considerations related to the use of mobile devices in the operation of critical infrastructures. International Journal of Critical Infrastructure Protection, 7, 247–256. 36. Lee, S. M., Suh, S. B., & Choi, J. D. (2010). Fine-grained I/O access control based on xen virtualization for 3G/4G mobiledevices. In Design automation conference (DAC), 2010 47th ACM/IEEE (pp. 108–113). 37. Mulliner, C., Liebergeld, S., Lange, M., & Seifert, J. P. (2012). Taming Mr Hayes: Mitigating signaling based attacks on smartphones. In IEEE/IFIP international conference on dependable systems and networks (DSN 2012) (pp. 1–12). 38. Zhang, X., Seifert, J. P., & Aciicmez, O. (2014). Design and implementation of efcient integrity protection for open mobile platforms. IEEE Transactions on Mobile Computing, 13, 188–201. 39. Zhang, X., Seifert, J.-P., & Ac?içmez, O. (2010). SEIP: Simple and efcient integrity protection for open mobile platforms. In International conference on information and communications security (pp. 107–125). 40. Chang, D., Hines, S., West, P., Tyson, G., & Whalley, D. (2012). Program diferentiation. Journal of Circuits, Systems, and Computers, 21, 1240007. 41. Kodeswaran, P., Nandakumar, V., Kapoor, S., Kamaraju, P., Joshi, A., & Mukherjea, S. (2012). Securing enterprise data on smartphones using run time information fow control. In 2012 IEEE 13th international conference on mobile data management (pp. 300–305). 42. Saudi, M. M., & Husainiamer, M. A. B. (2017). Mobile malware classifcation via system calls and permission for GPS exploitation. International Journal of Advanced Computer Science and Applications, 8, 277–283. 43. Dai Fei, G., Ai-Fen, S., & Tao, G. (2012). A behavior analysis based mobile malware defense system. In 2012 6th international conference on signal processing and communication systems (ICSPCS) (pp. 1–6). 44. Adas, H., Shetty, S., & Tayib, W. (2015). Scalable detection of web malware on smartphones. In 2015 international conference on information and communication technology research (ICTRC) (pp. 198–201). 45. Park, W., Lee, K. H., Kim, S., & Ryu, W. (2015). A fnancial fraud protection platform on Android smartphones in real-time. In 2015 international conference on information and communication technology convergence (ICTC) (pp. 1246–1248). 46. Derhab, A., Saleem, K., Al-Muhtadi, J., & Orgun, M. A. (2016). Leveraging adjusted user behavior in the detection and prevention of outgoing malicious SMSs in Android devices. Computers in Human Behavior, 59, 9–17. 47. Qingqing, S., Tao, Q., Tan, Y., & Yidong, C. (2013). An Android dynamic data protection model based on light virtualization. In 2013 15th IEEE international conference on communication technology (ICCT) (pp. 65–69). 48. Kothari, S., Deepak, A., Tamrawi, A., Holland, B., & Krishnan, S. (2014). A “Human-in-the-loop”; approach for resolving complex software anomalies. In 2014 IEEE international conference on systems, man, and cybernetics (SMC) (pp. 1971–1978). 49. Liang, S., Might, M., & Van Horn, D. (2015). AnaDroid: Malware analysis of android with user-supplied predicates. Electronic Notes in Theoretical Computer Science, 311, 3–14. 50. Shrestha, B., Ma, D., Zhu, Y., Li, H., & Saxena, N. (2015). Tap-wave-rub: Lightweight human interaction approach to curb emerging smartphone malware. IEEE Transactions on Information Forensics and Security, 10, 2270–2283. 51. Shrestha, B., Mohamed, M., Borg, A., Saxena, N., & Tamrakar, S. (2015). Curbing mobile malware based on user-transparent hand movements. In 2015 IEEE international conference on pervasive computing and communications (PerCom) (pp. 221–229). 52. Dongwoo, K., Chankyu, P., & Jaecheol, R. (2015). StopBankun: Countermeasure of app replacement attack on Android. In 2015 seventh international conference on ubiquitous and future networks (pp. 603–605). 53. Hung, S.-H., Hsiao, S.-W., Teng, Y.-C., & Chien, R. (2015). Real-time and intelligent private data protection for the Android platform. Pervasive and Mobile Computing, 24, 231–242. 54. Fitzgerald, W. M., Neville, U., & Foley, S. N. (2013). MASON: Mobile autonomic security for network access controls. Journal of Information Security and Applications, 18, 14–29. 55. Liang, S., Du, X., Tan, C. C., & Yu, W. (2014). An efective online scheme for detecting Android malware. In 2014 23rd international conference on computer communication and networks (ICCCN) (pp. 1–8). 56. Soh, C., Tan, H. B. K., Arnatovich, Y. L., & Wang, L. (2015). Detecting clones in android applications through analyzing user interfaces. In 2015 IEEE 23rd international conference on program comprehension (pp. 163–173). 57. Potharaju, R., Newell, A., Nita-Rotaru, C., & Zhang, X. (2012). Plagiarizing smartphone applications: attack strategies and defense techniques. In International symposium on engineering secure software and systems (pp. 106–120). 58. M. A. Dar (). A novel approach to restrict the access of malicious applications in android. In 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), 2017 (pp. 1–4). 59. Chen, J., Alalf, M. H., Dean, T. R., & Zou, Y. (2015). Detecting android malware using clone detection. Journal of Computer Science and Technology, 30, 942–956. 60. Chen, Y. L., Lee, H. M., Jeng, A. B., & Wei, T. E. (2015). DroidCIA: A novel detection method of code injection attacks on HTML5-based mobile apps. In Trustcom/BigDataSE/ISPA, 2015 IEEE (pp. 1014–1021). 61. Chen, K., Zhang, Y., & Liu, P. (2018). Leveraging information asymmetry to transform android apps into self-defending code against repackaging attacks. IEEE Transactions on Mobile Computing, 17, 1879–1893. 62. Niazi, R. H., Shamsi, J. A., Waseem, T., & Khan, M. M. (2015). Signature-based detection of privilege-escalation attacks on Android. In 2015 conference on information assurance and cyber security (CIACS) (pp. 44–49). 63. Geneiatakis, D., Fovino, I. N., Kounelis, I., & Stirparo, P. (2015). A Permission verifcation approach for android mobile applications. Computers & Security, 49, 192–205. 64. Zhongyuan, Q., Xinshuai, Z., Qunfang, Z., & Zhongyun, Y. (2014). An efcient method of detecting repackaged android applications. In International conference on cyberspace technology (CCT 2014) (pp. 1–4). 65. Louk, M., Lim, H., & Lee, H. (2014). An analysis of security system for intrusion in smartphone environment. The Scientifc World Journal. https://doi.org/10.1155/2014/983901. 66. Suarez-Tangil, G., Tapiador, J. E., & Peris-Lopez, P. (2014). Stegomalware: Playing hide and seek with malicious components in smartphone apps. In International conference on information security and cryptology (pp. 496–515). 67. Wei, T. E., Mao, C. H., Jeng, A. B., Lee, H. M., Wang, H. T., & Wu, D. J. (2012). Android malware detection via a latent network behavior analysis. In 2012 IEEE 11th international conference on trust, security and privacy in computing and communications (pp. 1251–1258). 68. Chen, P. S., Lin, S.-C., & Sun, C.-H. (2015). Simple and efective method for detecting abnormal internet behaviors of mobile devices. Information Sciences, 321, 193–204. 69. Shabtai, A., Tenenboim-Chekina, L., Mimran, D., Rokach, L., Shapira, B., & Elovici, Y. (2014). Mobile malware detection through analysis of deviations in application network behavior. Computers & Security, 43, 1–18. 70. Shabtai, A., Kanonov, U., & Elovici, Y. (2010). Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method. Journal of Systems and Software, 83, 1524–1537. 71. El Attar, A., Khatoun, R., & Lemercier, M. (2014). Clusteringbased anomaly detection for smartphone applications. In 2014 IEEE network operations and management symposium (NOMS) (pp. 1–4). 72. Isohara, T., Takemori, K., & Kubota, A. (2011). Kernel-based behavior analysis for android malware detection. In 2011 seventh international conference on computational intelligence and security (CIS) (pp. 1011–1015). 73. Xin, K., Li, G., Qin, Z., & Zhang, Q. (2012). Malware detection in smartphone using hidden Markov model. In 2012 fourth international conference on multimedia information networking and security (pp. 857–860). 74. Ham, Y. J., Choi, W. B., Lee, H. W., Lim, J. & Kim, J. N. (2012). Vulnerability monitoring mechanism in Android based smartphone with correlation analysis on event-driven activities. In 2012 2nd international conference on computer science and network technology (ICCSNT) (pp. 371–375). 75. Yuan, F., Zhai, L., Cao, Y., & Guo, L. (2013). Research of intrusion detection system on android. In 2013 IEEE ninth world congress on services (pp. 312–316). 76. Alam, M. S., & Vuong, S. T. (2013). Random forest classifcation for detecting android malware. In Green computing and communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE international conference on and IEEE cyber, physical and social computing (pp. 663–669). 77. Louw, M. T., Krull, M., Thomas, T., Cathey, R., Frazier, G., & Weber, M. (2013). Automated execution control and dynamic behavior monitoring for android (TM) applications. In MILCOM 2013—2013 IEEE military communications conference (pp. 968–973). 78. Wei, Y., Hanlin, Z., Linqiang, G., & Hardy, R. (2013). On behavior-based detection of malware on Android platform. In 2013 IEEE global communications conference (GLOBECOM) (pp. 814–819). 79. Attar, A. E., Khatoun, R., & Lemercier, M. (2014). A Gaussian mixture model for dynamic detection of abnormal behavior in smartphone applications. In 2014 global information infrastructure and networking symposium (GIIS) (pp. 1–6). 80. Attar, A. E., Khatoun, R., Birregah, B., & Lemercier, M. (2014). Robust clustering methods for detecting smartphone’s abnormal behavior. In 2014 IEEE wireless communications and networking conference (WCNC) (pp. 2552–2557).
81. Saad, M. H., Serageldin, A., & Salama, G. I. (2015). Android spyware disease and medication. In 2015 second international conference on information security and cyber forensics (InfoSec) (pp. 118–125). 82. Wang, C., Li, Z., Mo, X., Yang, H., & Zhao, Y. (2017). An android malware dynamic detection method based on service call co-occurrence matrices. Annals of Telecommunications, 72, 607–615. 83. Dai, S., Liu, Y., Wang, T., Wei, T., & Zou, W. (2010). Behaviorbased malware detection on mobile phone. In 2010 6th international conference on wireless communications networking and mobile computing (WiCOM) (pp. 1–4). 84. Ham, H.-S., Kim, H.-H., Kim, M.-S., & Choi, M.-J. (2014). Linear SVM-based android malware detection for reliable IoT services. Journal of Applied Mathematics. https://doi. org/10.1155/2014/594501. 85. Liu, Y., Jia, S., & Xing, C. (2012). A novel behavior-based virus detection method for smart mobile terminals. Discrete Dynamics in Nature and Society. https://doi.org/10.1155/2012/262193. 86. Suarez-Tangil, G., Conti, M., Tapiador, J. E., & Peris-Lopez, P. (2014). Detecting targeted smartphone malware with behavior-triggering stochastic models. In European symposium on research in computer security (pp. 183–201). 87. Kurniawan, H., Rosmansyah, Y., & Dabarsyah, B. (2015). Android anomaly detection system using machine learning classifcation. In 2015 international conference on electrical engineering and informatics (ICEEI) (pp. 288–293). 88. Lee, S., Lee, J., & Lee, H. (2013). Screening smartphone applications using behavioral signatures. In IFIP international information security conference (pp. 14–27). 89. Damopoulos, D., Kambourakis, G., Gritzalis, S., & Park, S. O. (2014). Exposing mobile malware from the inside (or what is your mobile app really doing?). Peer-to-Peer Networking and Applications, 7, 687–697. 90. Lu, Y., Zulie, P., Jingju, L., & Yi, S. (2013). Android malware detection technology based on improved Bayesian classifcation. In 2013 third international conference on instrumentation, measurement, computer, communication and control (IMCCC) (pp. 1338–1341). 91. Ming-Yang, S., & Wen-Chuan, C. (2014). Permission-based malware detection mechanisms for smart phones. In The international conference on information networking 2014 (ICOIN2014) (pp. 449–452). 92. Yerima, S. Y., Sezer, S., McWilliams, G., & Muttik, I. (2013). A new android malware detection approach using bayesian classifcation. In 2013 IEEE 27th international conference on advanced information networking and applications (AINA) (pp. 121–128). 93. Faruki, P., Laxmi, V., Ganmoor, V., Gaur, M. S., & Bharmal, A. (2013). DroidOLytics: Robust feature signature for repackaged android apps on ofcial and third party android markets. In 2013 2nd international conference on advanced computing, networking and security (pp. 247–252). 94. Peiravian, N., & Zhu, X. (2013). Machine learning for android malware detection using permission and API calls. In 2013 IEEE 25th international conference on tools with artifcial intelligence (pp. 300–305). 95. Wen, L. (2013). Mutiple classifer system based android malware detection. In 2013 international conference on machine learning and cybernetics (pp. 57–62). 96. Yüksel, A. S., Yüksel, M. E., Sertba?, A., & Zaim, A. H. (2017). Implementation of a web-based service for mobile application risk assessment. Turkish Journal of Electrical Engineering and Computer Science, 25, 976–994. 97. Fazeen, M., & Dantu, R. (2014). Another free app: Does it have the right intentions?. In 2014 twelfth annual international conference on privacy, security and trust (PST) (pp. 282–289).
98. Zheng, M., Sun, M., & Lui, J. C. S. (2014). DroidTrace: A ptrace based Android dynamic analysis system with forward execution capability. In 2014 international wireless communications and mobile computing conference (IWCMC) (pp. 128–133). 99. Teuf, P., Zeferer, T., Woergoetter, C., Oprisnik, A., & Hein, D. (2014). Android: On-device detection of SMS catchers and snifers. In 2014 international conference on privacy and security in mobile systems (PRISMS) (pp. 1–8). 100. Shen, T., Zhongyang, Y., Xin, Z., Mao, B., & Huang, H. (2014). Detect android malware variants using component based topology graph. In 2014 IEEE 13th international conference on trust, security and privacy in computing and communications (pp. 406–413). 101. Dhaya, R., & Poongodi, M. (2014). Detecting software vulnerabilities in android using static analysis. In 2014 international conference on advanced communication control and computing technologies (ICACCCT) (pp. 915–918). 102. Abraham, A., Andriatsimandeftra, R., Brunelat, A., Lalande, J. F., & Tong, V. V. T. (2015). GroddDroid: A gorilla for triggering malicious behaviors. In 2015 10th international conference on malicious and unwanted software (MALWARE) (pp. 119–127). 103. Yerima, S. Y., Sezer, S., & Muttik, I. (2015). High accuracy android malware detection using ensemble learning. IET Information Security, 9, 313–320. 104. Liang, S., & Du, X. (2014). Permission-combination-based scheme for android mobile malware detection. In 2014 IEEE international conference on communications (ICC) (pp. 2301–2306). 105. Elish, K. O., Shu, X., Yao, D., Ryder, B. G., & Jiang, X. (2015). Profling user-trigger dependence for Android malware detection. Computers & Security, 49, 255–273. 106. Feizollah, A., Anuar, N. B., Salleh, R., Suarez-Tangil, G., & Furnell, S. (2017). Androdialysis: Analysis of android intent efectiveness in malware detection. Computers & Security, 65, 121–134. 107. Talha, K. A., Alper, D. I., & Aydin, C. (2015). APK Auditor: Permission-based Android malware detection system. Digital Investigation, 13, 1–14. 108. Sheen, S., Anitha, R., & Natarajan, V. (2015). Android based malware detection using a multifeature collaborative decision fusion approach. Neurocomputing, 151(Part 2), 905–912. 109. Hang, D., He, N., Ge, H., Qi, L., & Zhang, M. (2014). Malware detection method of android application based on simplifcation instructions. The Journal of China Universities of Posts and Telecommunications, 21, 94–100. 110. Seo, S.-H., Gupta, A., Mohamed Sallam, A., Bertino, E., & Yim, K. (2014). Detecting mobile malware threats to homeland security through static analysis. Journal of Network and Computer Applications, 38, 43–53. 111. Song, J., Han, C., Wang, K., Zhao, J., Ranjan, R., & Wang, L. (2016). An integrated static detection and analysis framework for android. Pervasive and Mobile Computing, 32, 15–25. 112. Kaur, P., & Sharma, S. (2015). Spyware detection in android using hybridization of description analysis, permission mapping and interface analysis. Procedia Computer Science, 46, 794–803. 113. Almin, S. B., & Chatterjee, M. (2015). A novel approach to detect android malware. Procedia Computer Science, 45, 407–417. 114. Faruki, P., Laxmi, V., Bharmal, A., Gaur, M. S., & Ganmoor, V. (2015). AndroSimilar: Robust signature for detecting variants of Android malware. Journal of Information Security and Applications, 22, 66–80. 115. Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., et al. (2014). Flowdroid: Precise context, fow, feld, objectsensitive and lifecycle-aware taint analysis for android apps. ACM SIGPLAN Notices, 49, 259–269.
116. Lee, J., Lee, S., & Lee, H. (2015). Screening smartphone applications using malware family signatures. Computers & Security, 52, 234–249. 117. Wang, X., Yang, Y., & Zeng, Y. (2015). Accurate mobile malware detection and classifcation in the cloud. SpringerPlus, 4, 1. 118. Eder, T., Rodler, M., Vymazal, D., & Zeilinger, M. (2013). ANANAS: A framework for analyzing android applications. In 2013 eighth international conference on availability, reliability and security (ARES) (pp. 711–719). 119. Lindorfer, M., Neugschwandtner, M., & Platzer, C. (2015). MARVIN: Efcient and comprehensive mobile app classifcation through static and dynamic analysis. In Computer software and applications conference (COMPSAC), 2015 IEEE 39th annual (pp. 422–433). 120. Wang, P., & Wang, Y.-S. (2015). Malware behavioural detection and vaccine development by using a support vector model classifer. Journal of Computer and System Sciences, 81, 1012–1026. 121. Stirparo, P., Fovino, I. N., Taddeo, M., & Kounelis, I. (2013). Inmemory credentials robbery on android phones. In 2013 World Congress on Internet Security (WorldCIS) (pp. 88–93). 122. Nguyen, L., Tian, Y., Cho, S., Kwak, W., Parab, S., Kim, Y., et al. (2013). UnLocIn: Unauthorized location inference on smartphones without being caught. In 2013 International Conference on Privacy and Security in Mobile Systems (PRISMS) (pp. 1–8). 123. Kotkar, C., & Game, P. (2015). Prevention mechanism for prohibiting SMS malware attack on android smartphone. In 2015 annual IEEE India conference (INDICON) (pp. 1–5). 124. Te-En, W., Jeng, A. B., Hahn-Ming, L., Chih-How, C., & ChinWei, T. (2012). Android privacy. In 2012 international conference on machine learning and cybernetics (pp. 1830–1837). 125. Shastry, A., Kantarcioglu, M., Zhou, Y., & Thuraisingham, B. (2012). Randomizing smartphone malware profles against statistical mining techniques. In IFIP annual conference on data and applications security and privacy (pp. 239–254). 126. Liu, Z. Y., Li, Y. C., Yang, H. C., & Qiu, J. (2014). A case study on key technologies of Android Trojans. In 2014 11th international computer conference on wavelet active media technology and information processing (ICCWAMTIP) (pp. 321–324). 127. Szongott, C., Henne, B., & Smith, M. (2012). Evaluating the threat of epidemic mobile malware. In 2012 IEEE 8th international conference on wireless and mobile computing, networking and communications (WiMob) (pp. 443–450). 128. Maier, D., Protsenko, M., & Müller, T. (2015). A game of Droid and Mouse: The threat of split-personality malware on Android. Computers & Security, 54, 2–15. 129. Fernandes, E., Crispo, B., & Conti, M. (2013). Fm 99.9, radio virus: Exploiting fm radio broadcasts for malware deployment. IEEE Transactions on Information Forensics and Security, 8, 1027–1037. 130. Chiang, H. S., & Tsaur, W. J. (2010). Mobile malware behavioral analysis and preventive strategy using ontology. In 2010 IEEE second international conference on social computing (SocialCom) (pp. 1080–1085). 131. Sobhani, A., & Keshavarz-Haddad, A. (2015). A distributed patching scheme for controlling mobile malware infection. In 2015 23rd Iranian conference on electrical engineering (pp. 187–192). 132. Park, J.-K., & Choi, S.-Y. (2015). Studying security weaknesses of android system. International Journal of Security and Its Applications. Science and Engineering Research Support Center, 9, 7–12. 133. Titze, D., Stephanow, P., & Schütte, J. (2013). A confgurable and extensible security service architecture for smartphones. In 2013 27th international conference on advanced information networking and applications workshops (WAINA) (pp. 1056–1062).
134. Kim, S., & Lee, K. T. (2014). A security architecture for BYOD ofce. In 2014 international conference on advanced technologies for communications (ATC 2014) (pp. 487–490). 135. Chung, S., Chung, S., Escrig, T., Bai, Y., & Endicott-Popovsky, B. (2012). 2TAC: Distributed access control architecture for “bring your own device” security. In 2012 ASE/IEEE international conference on biomedical computing (BioMedCom) (pp. 123–126). 136. Cho, T., & Seo, S.-H. (2015). A strengthened android signature management method. TIIS, 9, 1210–1230. 137. Gilad, Y., Herzberg, A., & Trachtenberg, A. (2014). Securing smartphones: A µTCB approach. IEEE Pervasive Computing, 13, 72–79. 138. Paul, M., Chauhan, N. S., & Saxena, A. (2011). A security analysis of smartphone data fow and feasible solutions for lawful interception. In 2011 7th international conference on information assurance and security (IAS) (pp. 19–24). 139. Lee, C., Kim, J., Cho, S.-J., Choi, J., & Park, Y. (2014). Unifed security enhancement framework for the Android operating system. The Journal of Supercomputing, 67, 738–756. 140. Bani-Hani, R. M., Wahsheh, Y. A., & Al-Sarhan, M. B. (2014). Secure QR code system. In 2014 10th international conference on innovations in information technology (INNOVATIONS) (pp. 1–6). 141. Feng, T., DeSalvo, N., Xu, L., Zhao, X., Wang, X., & Shi, W. (2014). Secure session on mobile: An exploration on combining biometric, trustzone, and user behavior. In 2014 6th international conference on mobile computing, applications and services (MobiCASE) (pp. 206–215). 142. Teuf, P., Zeferer, T., & Stromberger, C. (2013). Mobile device encryption systems. In IFIP international information security conference (pp. 203–216). 143. Baek, J., & Youm, H. Y. (2015). Secure and lightweight authentication protocol for NFC tag based services. In 2015 10th Asia joint conference on information security (AsiaJCIS) (pp. 63–68). 144. Pournaghshband, V., Meyer, D., Holyland, M., Sarrafzadeh, M., & Reiher, P. (2014). Adrasteia: A smartphone app for securing legacy mobile medical devices. In 2014 IEEE 17th international conference on computational science and engineering (CSE) (pp. 758–763). 145. Guri, M., Kedma, G., Zadov, B., & Elovici, Y. (2014). Trusted detection of sensitive activities on mobile phones using power consumption measurements. In Intelligence and security informatics conference (JISIC), 2014 IEEE Joint (pp. 145–151). 146. Guido, M., Ondricek, J., Grover, J., Wilburn, D., Nguyen, T., & Hunt, A. (2013). Automated identifcation of installed malicious Android applications. Digital Investigation, 10(Supplement), S96–S104. 147. Alam, M., & Vuong, S. T. (2014). An intelligent multi-agent based detection framework for classifcation of android malware. In International conference on active media technology (pp. 226–237). 148. Singh, S., Mishra, B., & Singh, S. (2015). Detecting intelligent malware on dynamic Android analysis environments. In 2015 10th international conference for internet technology and secured transactions (ICITST) (pp. 414–419). 149. Qian, H., & Wen, Q. (2012). A cloud-based system for enhancing security of Android devices. In 2012 IEEE 2nd international conference on cloud computing and intelligence systems (pp. 245–249). 150. Zonouz, S., Houmansadr, A., Berthier, R., Borisov, N., & Sanders, W. (2013). Secloud: A cloud-based comprehensive and lightweight security solution for smartphones. Computers & Security, 37, 215–227. 151. Ding, J.-H., Chien, R., Hung, S.-H., Lin, Y.-L., Kuo, C.-Y., Hsu, C.-H., et al. (2014). A framework of cloud-based virtual phones
for secure intelligent information management. International Journal of Information Management, 34, 329–335. 152. Dye, S. M., & Scarfone, K. (2014). A standard for developing secure mobile applications. Computer Standards & Interfaces, 36, 524–530. 153. Zhu, K., Song, Y., & Chen, F. (2014). Implementation of automated testing system for android applications based on dynamic taint propagation. In Communications security conference (CSC 2014) (pp. 1–5). 154. Lagerspetz, E., Truong, H. T. T., Tarkoma, S., & Asokan, N. (2014). MDoctor: A mobile malware prognosis application. In 2014 IEEE 34th international conference on distributed computing systems workshops (ICDCSW) (pp. 201–206). 155. Wählisch, M., Trapp, S., Schiller, J., Jochheim, B., Nolte, T., Schmidt, T. C., et al. (2012). Vitamin C for your smartphone: The SKIMS approach for cooperativeand lightweight security at mobiles. ACM SIGCOMM Computer Communication Review, 42, 271–272. 156. Pieterse, H., & Olivier, M. S. (2013). Security steps for smartphone users. In 2013 Information Security for South Africa (pp. 1–6). 157. Hoque, E., Potharaju, R., Nita-Rotaru, C., Sarkar, S., & Venkatesh, S. S. (2015). Taming epidemic outbreaks in mobile adhoc networks. Ad Hoc Networks, 24, 57–72. 158. Bhatt, A. J., & Gupta, C. (2017). Comparison of static and dynamic analyzer tools for iOS applications. Wireless Personal Communications, 96, 4013–4046. 159. Bernik, I., & Markelj, B. (2012). Blended threats to mobile devices on the rise. In 2012 international conference on information society (i-Society) (pp. 59–64). 160. Pieterse, H., & Olivier, M. S. (2012). Android botnets on the rise: Trends and characteristics. In 2012 information security for South Africa (pp. 1–5). 161. Xueming, L. (2013). Access control research based on trusted computing android smartphone. In 2013 third international conference on intelligent system design and engineering applications (ISDEA) (pp. 213–215). 162. Pu, S., Chen, Z., Huang, C., Liu, Y., & Zen, B. (2014). Threat analysis of smart mobile device. In General assembly and scientifc symposium (URSI GASS), 2014 XXXIth URSI (pp. 1–3). 163. Rastogi, S., Bhushan, K., & Gupta, B. (2016). Android applications repackaging detection techniques for smartphone devices. Procedia Computer Science, 78, 26–32. 164. Batten, L., Moonsamy, V., & Alazab, M. (2015). Smartphone applications, malware and data theft. In M. Senthilkumar, V. Ramasamy, S. Sheen, C. Veeramani, A. Bonato, & L. Batten (Eds.), Computational intelligence, cyber security and computational models (pp. 15–24). Berlin: Springer. https://doi. org/10.1007/978-981-10-0251-9_2. 165. Mu, J., Cui, A., & Rao, J. (2013). Android mobile security– threats and protection. In International conference on computer, networks and communication engineering (ICCNCE 2013) (pp. 683–686). 166. Abdullah, Z., Saudi, M. M., & Anuar, N. B. (2014). Mobile botnet detection: Proof of concept. In 2014 IEEE 5th Control and System Graduate Research Colloquium (ICSGRC) (pp. 257–262). 167. Kumar, M., & Hanumanthappa, M. (2015). Cloud based intrusion detection architecture for smartphones. In 2015 international conference on innovations in information, embedded and communication systems (ICIIECS) (pp. 1–6). 168. Yang, T., Yang, Y., Qian, K., Lo, D. C. T., Qian, Y., & Tao, L. (2015). Automated detection and analysis for android ransomware. In 2015 IEEE 17th international conference on high performance computing and communications (HPCC), 2015 IEEE 7th international symposium on cyberspace safety and security
(CSS), 2015 IEEE 12th international conferen on embedded software and systems (ICESS) (pp. 1338–1343). 169. Ghallali, M., & Ouahidi, B. E. (2012). Security of mobile phones: Prevention methods for the spread of malware. In 2012 6th international conference on sciences of electronics, technologies of information and telecommunications (SETIT) (pp. 648–651). 170. Lee, S., & Ju, D. Y. (2013). Assessment of malicious applications using permissions and enhanced user interfaces on Android. In 2013 IEEE international conference on intelligence and security informatics (ISI) (pp. 270–270). 171. Dixon, B., & Mishra, S. (2010). On rootkit and malware detection in smartphones. In 2010 international conference on dependable systems and networks workshops (DSN-W) (pp. 162–163). 172. Chiang, H. S., & Tsaur, W. J. (2011). Identifying smartphone malware using data mining technology. In 2011 proceedings of 20th international conference on computer communications and networks (ICCCN) (pp. 1–6). 173. Bing, H. (2012). Analysis and research of system security based on android. In 2012 fifth international conference on intelligent computation technology and automation (ICICTA) (pp. 581–584). 174. Lei, Z., Junmao, Z., Zhongguang, T., Yulong, L., & Tao, W. (2011). Design of mobile phone security system based on detection of abnormal behavior. In 2011 frst international conference on instrumentation, measurement, computer, communication and control (pp. 479–482). 175. Woo-Sung, C., & Dea-Woo, P. (2012). Malicious code hiding android APP’s distribution and hacking attacks and incident analysis. In 2012 8th international conference on information science and digital content technology (ICIDT) (pp. 686–689). 176. Seo, S. H., Lee, D. G., & Yim, K. (2012). Analysis on maliciousness for mobile applications. In 2012 sixth international conference on innovative mobile and internet services in ubiquitous computing (IMIS) (pp. 126–129). 177. Chemerkin, Y. (2012). Vulnerability elimination by force of new mobile OS Comparative research of security techniques on BlackBerry OS (incl. PlayBook). In 2012 international conference for Internet technology and secured transactions (pp. 483–487). 178. Park, M. W., & Chung, T. M. (2013). Vulnerability of the smartphone applications to connect with compromised access point. In 2013 international conference on information science and applications (ICISA) (pp. 1–2). 179. Attar, A. E., Khatoun, R., & Lemercier, M. (2013). Diagnosing smartphone’s abnormal behavior through robust outlier detection methods. In Global information infrastructure symposium—GIIS 2013 (pp. 1–3). 180. Zaman, M., Siddiqui, T., Amin, M. R., & Hossain, M. S. (2015). Malware detection in Android by network trafc analysis. In 2015 international conference on networking systems and security (NSysS) (pp. 1–5). 181. Park, W., Kim, S., & Ryu, W. (2015). Detecting malware with similarity to Android applications. In 2015 international conference on information and communication technology convergence (ICTC) (pp. 1249–1251). 182. Kim, M., Lee, T. J., Shin, Y., & Youm, H. Y. (2016). A study on behavior-based mobile malware analysis system against evasion techniques. In 2016 international conference on information networking (ICOIN), 2016 (pp. 455–457). 183. Singh, P., Tiwari, P., & Singh, S. (2016). Analysis of malicious behavior of android apps. Procedia Computer Science, 79, 215–220. 184. Chen, P.-Y., Lin, H.-F., Hsu, K.-H., & Cheng, S.-M. (2014). Modeling dynamics of malware with incubation period from the view of individual. In 2014 IEEE 79th vehicular technology conference (VTC Spring) (pp. 1–5).
185. Teufl, P., Ferk, M., Fitzek, A., Hein, D., Kraxberger, S., & Orthacker, C. (2013). Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play). Security and Communication Networks, 9(5), 389–419. 186. Peng, S., Wu, M., Wang, G., & Yu, S. (2014). Propagation model of smartphone worms based on semi-Markov process and social relationship graph. Computers & Security, 44, 92–103. 187. Martinelli, F., Saracino, A., Sgandurra, D., & Aldini, A. (2013). A collaborative framework for generating probabilistic contracts. In 2013 international conference on collaboration technologies and systems (CTS) (pp. 139–142). 188. Peng, S., Wang, G., & Yu, S. (2013). Modeling malware propagation in smartphone social networks. In 2013 12th IEEE international conference on trust, security and privacy in computing and communications (pp. 196–201). 189. Park, Y., Reeves, D. S., & Stamp, M. (2013). Deriving common malware behavior through graph clustering. Computers & Security, 39, 419–430. 190. Peng, S., Wu, M., Wang, G., & Yu, S. (2014). Containing smartphone worm propagation with an infuence maximization algorithm. Computer Networks, 74, 103–113. 191. Li, F., Yang, Y., & Wu, J. (2010). CPMC: An efcient proximity malware coping scheme in smartphone-based mobile networks. Presented at the Proceedings of the 29th conference on information communications, San Diego, California, USA. 192. Xie, L., Zhang, X., Seifert, J.-P., & Zhu, S. (2010). pBMDS: A behavior-based malware detection system for cellphone devices. In Proceedings of the third ACM conference on wireless network security (pp. 37–48). 193. Omar, M., & Dawson, M. (2013). Research in progress—Defending android smartphones from malware attacks. In 2013 third international conference on advanced computing and communication technologies (ACCT) (pp. 288–292). 194. Al-Hadadi, M., & Shidhani, A. A. (2013). Smartphone security awareness: Time to act. In 2013 international conference on current trends in information technology (CTIT) (pp. 166–171). 195. Dang-Pham, D., & Pittayachawan, S. (2015). Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach. Computers & Security, 48, 281–297. 196. Markelj, B., & Bernik, I. (2015). Safe use of mobile devices arises from knowing the threats. Journal of Information Security and Applications, 20, 84–89. 197. Imgraben, J., Engelbrecht, A., & Choo, K.-K. R. (2014). Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users. Behaviour & Information Technology, 33, 1347–1360. 198. Panja, B., Fattaleh, D., Mercado, M., Robinson, A., & Meharia, P. (2013). Cybersecurity in banking and fnancial sector: Security analysis of a mobile banking application. In 2013 international conference on collaboration technologies and systems (CTS) (pp. 397–403). 199. Adebayo, O. S. & Aziz, N. A. (2014). Techniques for analysing Android malware. In 2014 the 5th international conference on information and communication technology for the Muslim World (ICT4M) (pp. 1–6). 200. Salerno, S., Sanzgiri, A., & Upadhyaya, S. (2011). Exploration of attacks on current generation smartphones. Procedia Computer Science, 5, 546–553. 201. Zdziarski, J. (2014). Identifying back doors, attack points, and surveillance mechanisms in iOS devices. Digital Investigation, 11, 3–19. 202. Maiorca, D., Ariu, D., Corona, I., Aresu, M., & Giacinto, G. (2015). Stealth attacks: An extended insight into the obfuscation efects on Android malware. Computers & Security, 51, 16–31
203. Yu, W., Zhang, H., & Xu, G. (2013). A study of malware detection on smart mobile devices. In SPIE defense, security, and sensing, 2013 (pp. 87570H–87570H-8). 204. Mylonas, A., Dritsas, S., Tsoumas, B., & Gritzalis, D. (2011). Smartphone security evaluation: The malware attack case. In 2011 proceedings of the international conference on security and cryptography (SECRYPT) (pp. 25–36). 205. Virvilis, N., Mylonas, A., Tsalis, N., & Gritzalis, D. (2015). Security busters: Web Browser security vs. rogue sites. Computers & Security, 52, 90–105. 206. Li, F., Huang, C.-T., Huang, J., & Peng, W. (2014). Feedbackbased smartphone strategic sampling for BYOD security. In 2014 23rd international conference on computer communication and networks (ICCCN) (pp. 1–8). 207. Armando, A., Merlo, A., Migliardi, M., & Verderame, L. (2013). Breaking and fxing the android launching fow. Computers & Security, 39(Part A), 104–115. 208. Cheon, W. B., Heo, K., Lim, W. G., Park, W. H., & Chung, T. M. (2011). The new vulnerability of service set identifer (SSID) using QR code in android phone. In 2011 international conference on information science and applications (pp. 1–6). 209. Hua, J., & Sakurai, K. (2013). Botnet command and control based on Short Message Service and human mobility. Computer Networks, 57, 579–597. 210. Pan, J., & Chun Che, F. (2013). An offensive containment strategy based on Malware’s attack patterns. In 2013 international conference on machine learning and cybernetics (pp. 1631–1636). 211. Dixon, B., & Mishra, S. (2013). Power based malicious code detection techniques for smartphones. In 2013 12th IEEE international conference on trust, security and privacy in computing and communications (pp. 142–149). 212. Alfalqi, K., Alghamdi, R., & Waqdan, M. (2015). Android platform malware analysis. International Journal of Advanced Computer Science and Applications (IJACSA). https://doi. org/10.14569/IJACSA.2015.060120 213. Amamra, A., Robert, J. M., & Talhi, C. (2015). Enhancing malware detection for Android systems using a system call fltering and abstraction process. Security and Communication Networks, 8, 1179–1192. 214. Amos, B., Turner, H., & White, J. (2013). Applying machine learning classifers to dynamic Android malware detection at scale. In 2013 9th international wireless communications and mobile computing conference (IWCMC) (pp. 1666–1671). 215. Amamra, A., Talhi, C., & Robert, J. M. (2012). Performance evaluation of multi-pattern matching algorithms on smartphone. In 2012 seventh international conference on broadband, wireless computing, communication and applications (BWCCA) (pp. 329–334). 216. Merlo, A., Costa, G., Verderame, L., & Armando, A. (2016). Android vs. SEAndroid: An empirical assessment. Pervasive and Mobile Computing, 30, 113–131. 217. Suarez-Tangil, G., Tapiador, J. E., Peris-Lopez, P., & Pastrana, S. (2015). Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation. Pervasive and Mobile Computing, 18, 137–151. 218. Krombholz, K., Frühwirt, T., Rieder, Kapsalis, I., et al. (2015). QR code security—How secure and usable apps can protect users against malicious QR codes. In 2015 10th international conference on availability, reliability and security (ARES) (pp. 230–237). 219. Gelenbe, E., Görbil, G., Tzovaras, D. K., Liebergeld, S., García, D., Baltatu, M., et al. (2013). NEMESYS: Enhanced network security for seamless service provisioning in the smart mobile ecosystem. In Information sciences and systems (pp. 369–378). Berlin: Springer.
220. Lindorfer, M., Neugschwandtner, M., Weichselbaum, L., Fratantonio, Y., van den Veen, V., & Platzer, C. (2014). ANDRUBIS—1,000,000 apps later: A view on current android malware behaviors. In 2014 third international workshop on building analysis datasets and gathering experience returns for security (BADGERS) (pp. 3–17). 221. Zhou, Y., & Jiang, X. (2012). Dissecting android malware: Characterization and evolution. In 2012 IEEE symposium on security and privacy (pp. 95–109). 222. Pieterse, H., & Burke, I. (2015). Evolution study of android botnets. In Iccws 2015—The proceedings of the 10th international conference on cyber warfare and security: ICCWS2015 (p. 232). 223. Su, X., Chuah, M., & Tan, G. (2012). Smartphone dual defense protection framework: Detecting malicious applications in android markets. In 2012 eighth international conference on mobile ad-hoc and sensor networks (MSN) (pp. 153–160). 224. Attar, A. E., Khatoun, R., & Lemercier, M. (2014). Trimming approach of robust clustering for smartphone behavioral analysis. In 2014 12th IEEE international conference on embedded and ubiquitous computing (EUC) (pp. 315–320). 225. Suarez-Tangil, G., Tapiador, J. E., Peris-Lopez, P., & Blasco, J. (2014). Dendroid: A text mining approach to analyzing and classifying code structures in android malware families. Expert Systems with Applications, 41, 1104–1117. 226. Jang, J.-W., Kang, H., Woo, J., Mohaisen, A., & Kim, H. K. (2015). Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information. Digital Investigation, 14, 17–35. 227. Mylonas, A., Dritsas, S., Tsoumas, B., & Gritzalis, D. (2011). On the feasibility of malware attacks in smartphone platforms. In International conference on e-business and telecommunications (pp. 217–232). 228. Tang, W., Jin, G., He, J., & Jiang, X. (2011). Extending android security enforcement with a security distance model. In 2011 international conference on internet technology and applications (iTAP) (pp. 1–4). 229. Kuehnhausen, M., & Frost, V. S. (2013). Trusting smartphone Apps? To install or not to install, that is the question. In 2013 IEEE international multi-disciplinary conference on cognitive methods in situation awareness and decision support (CogSIMA) (pp. 30–37). 230. Wu, B., Lu, T., Zheng, K., Zhang, D., & Lin, X. (2014). Smartphone malware detection model based on artifcial immune system. China Communications, 11, 86–92. 231. Rashidi, B., Fung, C., & Vu, T. (2015). Dude, ask the experts!: Android resource access permission recommendation with RecDroid. In 2015 IFIP/IEEE international symposium on integrated network management (IM) (pp. 296–304). 232. Shastry, A., Kantarcioglu, M., Zhou, Y., & Thuraisingham, B. (2012). Randomizing smartphone malware profles against statistical mining techniques (pp. 239–254). Berlin: Springer. 233. Alam, M. S. & Vuong, S. T. (2013). Random forest classifcation for detecting android malware. In 2013 IEEE international conference on green computing and communications and IEEE Internet of Things and IEEE cyber, physical and social computing (pp. 663–669). 234. Meskini, S., Nassif, A. B., & Capretz, L. F. (2013). Reliability models applied to mobile applications. In 2013 IEEE seventh international conference on software security and reliability companion (pp. 155–162). 235. Yas, Q. M., et al. (2018). Comprehensive insights into evaluation and benchmarking of real-time skin detectors: Review, open issues & challenges, and recommended solutions. Measurement, 114, 243–260. https://doi.org/10.1016/j.measuremen t.2017.09.027.
236. Zaidan, A. A., et al. (2018). A review on smartphone skin cancer diagnosis apps in evaluation and benchmarking: coherent taxonomy, open issues and recommendation pathway solution. Health and Technology, 8(4), 223–238. https://doi.org/10.1007/ s12553-018-0223-9. 237. Beikkhakhian, Y., Javanmardi, M., Karbasian, M., & Khayambashi, B. (2015). The application of ISM model in evaluating agile suppliers selection criteria and ranking suppliers using fuzzy TOPSIS-AHP methods. Expert Systems with Applications, 42(15), 6224–6236. 238. Ortiz Barrios, M. A., Nino, C., Patricia, J., La De Hoz, A. A., De Felice, F., & Petrillo, A. (2016). An integrated approach of AHPDEMATEL methods applied for the selection of allied hospitals in outpatient service. International Journal of Medical Engineering and Informatics, 8(2), 87–107. 239. Yoon, K. P., & Hwang, C.-L. (1995). Multiple attribute decision making: an introduction (Vol. 104). London: Sage publications. 240. Nilsson, H., Nordström, E.-M., & Öhman, K. (2016). Decision support for participatory forest planning using AHP and TOPSIS. Forests, 7(5), 100. 241. Jumaah, F. M., et al. (2018). Decision-making solution based multi-measurement design parameter for optimization of GPS receiver tracking channels in static and dynamic real-time positioning multipath environment. Measurement, 118, 83–95. https ://doi.org/10.1016/j.measurement.2018.01.011. 242. Zaidan, A. A., et al. (2015). Evaluation and selection of opensource EMR software packages based on integrated AHP and TOPSIS. Journal of Biomedical Informatics, 53, 390–404. 243. Zaidan, A. A., et al. (2015). Multi-criteria analysis for OS-EMR software selection problem: A comparative study. Decision Support Systems, 78, 15–27. 244. Abdullateef, B. N., et al. (2016). An evaluation and selection problems of OSS-LMS packages. SpringerPlus, 5(1), 1–35. 245. Yas, Q. M., et al. (2017). Towards on develop a framework for the evaluation and benchmarking of skin detectors based on artifcial intelligent models using multi-criteria decision-making techniques. International Journal of Pattern Recognition and Artifcial Intelligence, 31(03), 1759002. 246. Zaidan, B. B., et al. (2017). A new digital watermarking evaluation and benchmarking methodology using an external group of evaluators and multi-criteria analysis based on ‘large-scale data’. Software: Practice and Experience, 47(10), 1365–1392. 247. Zaidan, B. B., & Zaidan, A. A. (2017). Software and hardware FPGA-based digital watermarking and steganography approaches: Toward new methodology for evaluation and benchmarking using multi-criteria decision-making techniques. The Journal of Circuits, Systems and Computers, 26(07), 1750116. 248. Zaidan, B. B., Zaidan, A. A., Abdul Karim, H., & Ahmad, N. N. (2017). A new approach based on multi-dimensional evaluation and benchmarking for data hiding techniques. International Journal of Information Technology & Decision Making, 17, 1–42. 249. Qader, M. A., et al. (2017). A methodology for football players selection problem based on multi-measurements criteria analysis. Measurement: Journal of the International Measurement Confederation, 111, 38–50. 250. Jumaah, F. M., et al. (2018). Technique for order performance by similarity to ideal solution for solving complex situations in multi-criteria optimization of the tracking channels of GPS baseband telecommunication receivers. Telecommunication Systems, 68(3), 425–443. 251. Rahmatullah, B., et al. (2017). Multi-complex attributes analysis for optimum GPS baseband receiver tracking channels selection. In 2017 4th international conference on control, decision and information technologies, CoDIT 2017 (Vol. 2017–Janua, pp. 1084–1088)
252. Salman, O. H., et al. (2017). Novel methodology for triage and prioritizing using “big data” patients with chronic heart diseases through telemedicine environmental. International Journal of Information Technology & Decision Making, 16(05), 1211–1245. 253. Zaidan, B. B., & Zaidan, A. A. (2018). Comparative study on the evaluation and benchmarking information hiding approaches based multi-measurement analysis using TOPSIS method with diferent normalisation, separation and context techniques. Measurement : Journal of the International Measurement Confederation, 117, 277–294. 254. Kalid, N., et al. (2018). Based on real time remote health monitoring systems: A new approach for prioritization ‘large scales data’ patients with chronic heart diseases using body sensors and communication technology. Journal of Medical Systems, 42(4), 69. 255. Alsalem, M. A., et al. (2018). Systematic review of an automated multiclass detection and classifcation system for acute Leukaemia in terms of evaluation and benchmarking, open challenges, issues and methodological aspects. Journal of Medical Systems, 42(11), 204. 256. Enaizan, O., et al. (2018). Electronic medical record systems: Decision support examination framework for individual, security and privacy concerns using multi-perspective analysis. Health and Technology, 8, 1–28. 257. Salih, M. M., et al. (2019). Survey on fuzzy TOPSIS state-ofthe-art between 2007–2017. Computers & Operations Research, 104, 207–227. 258. Kalid, N., et al. (2018). Based real time remote health monitoring systems: A review on patients prioritization and related ‘big data’ using body sensors information and communication technology. Journal of Medical Systems, 42(2), 30. 259. Albahri, A. S., et al. (2018). Real-time fault-tolerant mHealth System: Comprehensive review of healthcare services, opens issues, challenges and methodological aspects. Journal of Medical Systems, 42(8), 137. 260. Albahri, O. S., et al. (2018). Real-time remote health-monitoring systems in a medical centre: A review of the provision of healthcare services-based body sensor information, open challenges and methodological aspects. Journal of Medical Systems, 42(9), 164. 261. Albahri, A. S., et al. (2019). Based multiple heterogeneous wearable sensors: A smart real-time health monitoring structured for hospitals distributor. IEEE Access, 7, 37269–37323. https://doi. org/10.1109/ACCESS.2019.2898214. 262. Shankar, V. G., Somani, G., Gaur, M. S., Laxmi, V., & Conti, M. (2017). AndroTaint: An efcient android malware detection framework using dynamic taint analysis. In 2017 ISEA Asia security and privacy (ISEASP) (pp. 1–13). 263. Fan, M., Liu, J., Wang, W., Li, H., Tian, Z., & Liu, T. (2017). DAPASA: Detecting android piggybacked apps through sensitive subgraph analysis. IEEE Transactions on Information Forensics and Security, 12, 1772–1785. 264. Ajaeiya, G., Elhajj, I. H., Chehab, A., Kayssi, A., & Kneppers, M. (2018). Mobile Apps identifcation based on network fows. Knowledge and Information Systems, 55, 771–796. 265. Papadopoulos, H., Georgiou, N., Eliades, C., & Konstantinidis, A. (2018). Android malware detection with unbiased confdence guarantees. Neurocomputing, 280, 3–12. 266. Ham, Y. J., Choi, W. B., Lee, H. W., Lim, J., & Kim, J. N. (2012). Vulnerability monitoring mechanism in Android based smartphone with correlation analysis on event-driven activities. In Proceedings of 2012 2nd international conference on computer science and network technology (pp. 371–375). 267. Tan, Y.-A., Xue, Y., Liang, C., Zheng, J., Zhang, Q., Zheng, J., et al. (2018). A root privilege management scheme with
revocable authorization for Android devices. Journal of Network and Computer Applications, 107, 69–82. 268. Wang, H., He, H., & Zhang, W. (2018). Demadroid: Object reference graph-based malware detection in android. Security and Communication Networks. https://doi.org/10.1155/2018/70641 31. 269. Wang, X., Yang, Y., & Zeng, Y. (2015). Accurate mobile malware detection and classifcation in the cloud. SpringerPlus, 4, 583. 270. Lu, Y., Zulie, P., Jingju, L., & Yi, S. (2013). Android malware detection technology based on improved Bayesian classifcation. In 2013 third international conference on instrumentation, measurement, computer, communication and control (pp. 1338–1341). 271. Fazeen, M., & Dantu, R. (2014). Another free app: Does it have the right intentions? In 2014 twelfth annual international conference on privacy, security and trust (pp. 282–289). 272. Lindorfer, M., Neugschwandtner, M., & Platzer, C. (2015). MARVIN: Efcient and comprehensive mobile app classifcation through static and dynamic analysis. In 2015 IEEE 39th annual computer software and applications conference (pp. 422–433).
|
This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials. You may use the digitized material for private study, scholarship, or research. |