Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/1784
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSulaimon, Salama A.-
dc.contributor.authorAdebayo, Olawale Surajudeen-
dc.contributor.authorBashir, Sulaimon A.-
dc.contributor.authorIsmaila, Idris-
dc.date.accessioned2021-06-06T19:06:38Z-
dc.date.available2021-06-06T19:06:38Z-
dc.date.issued2018-
dc.identifier.issn2350-1413-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/1784-
dc.description.abstractThe accuracy of any classification algorithm essentially depends on the cohesiveness and structure of the training dataset and its features. The detection of malicious applications running on android devices has become a task that cannot be overemphasized. This is due to the wide acceptability and usefulness of these devices. This usefulness however has also made the Android applications to become soft targets for malware hackers. In order to ameliorate this problem, different malware detection techniques have been proposed in the literature. However, the accuracy and false alarm rate still require improvements in order to have a versatile detector. This research therefore presents the use of Whale Optimization Technique for feature selection of permission-based feature of Android applications for better classification accuracy. The results show that the accuracy is improved using this algorithm compare to some known existing detector models with or without feature selectoren_US
dc.language.isoenen_US
dc.publisherJournal on Mobile Applications & Technologiesen_US
dc.relation.ispartofseriesVolume 5;2-
dc.subjectAndroid Malwareen_US
dc.subjectWhale Optimization Algorithmen_US
dc.subjectAndroid Permission Featureen_US
dc.subjectBenign Android Applicationen_US
dc.subjectMalicious Android Applicationen_US
dc.subjectCandidate Detectorsen_US
dc.titleAndroid Malware Classification using Whale Optimization Algorithmen_US
dc.typeArticleen_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
Salama JMT (Jul-Dec'18)-5.pdf774.94 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.