Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/9733
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSulaiman, Salamatu Aliyu-
dc.contributor.authorOlawale, Surajudeen Adebayo-
dc.contributor.authorIsmaila, Idris-
dc.contributor.authorSulaimon, A. Bashir-
dc.date.accessioned2021-07-15T22:20:03Z-
dc.date.available2021-07-15T22:20:03Z-
dc.date.issued2018-07-
dc.identifier.issn2350-1413-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/9733-
dc.description.abstractThe accuracy of any classification algorithm essentially depends on the cohesiveness and structure of the training dataset and its features. The detection of malicious applications running on android devices has become a task that cannot be overemphasized. This is due to the wide acceptability and usefulness of these devices. This usefulness however has also made the Android applications to become soft targets for malware hackers. In order to ameliorate this problem, different malware detection techniques have been proposed in the literature. However, the accuracy and false alarm rate still require improvements in order to have a versatile detector. This research therefore presents the use of Whale Optimization Technique for feature selection of permission-based feature of Android applications for better classification accuracy. The results show that the accuracy is improved using this algorithm compare to some known existing detector models with or without feature selector.en_US
dc.language.isoenen_US
dc.publisheri-manager’s Journal on Mobile Applications & Technologiesen_US
dc.subjectAndroid Malware, Whale Optimization Algorithm, Android Permission Feature, Benign Android Application, Malicious Android Application, Candidate Detectors.en_US
dc.titleAndroid malware classification using whale optimization algorithmen_US
dc.typeArticleen_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
ANDROID MALWARE CLASSIFICATION USING WHALE.pdfANDROID MALWARE CLASSIFICATION USING WHALE OPTIMIZATION ALGORITHM774.94 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.