UGC Approved Journal no 63975(19)
New UGC Peer-Reviewed Rules

ISSN: 2349-5162 | ESTD Year : 2014
Volume 12 | Issue 9 | September 2025

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 10 Issue 5
May-2023
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2305414


Registration ID:
515246

Page Number

e108-e113

Share This Article


Jetir RMS

Title

Machine Learning-Based Malicious App Detection of Android

Abstract

Recent years have seen a continuous increase mostly in utilization of high- tech smart telephones, together with the growth of Program programming service users. A few attendees began creating vengeful Mobile apps as a tool to steal sensitive facts but instead knowledge as forgery as well as deception of moveable banks and varied bags due to their growth among Google operating system patients. There is good amount many evil programmes and tools that may be found, as well as malicious behavior. However, a realistically effective more spiteful signer mechanism is anticipated to cope to address new sophisticated evil apps created by intruders or engineers. These article uses techniques corresponding sub device teaching to identify malicious Web apps. First, using a Virtual feature extraction, a sample of previous threat actors must be gathered. The main steps performed through this framework are sketched as follows: 1. Using various potential methods of assessing virus, a collection of characteristics is produced for each source format there in teaching or tested samples. 2. A depths learner method is developed on a standard size sample including cleaner versus malicious folders sharing a single activation function itself as foundation, followed by touchscreen two - dimensional autoencoder, kernelized another convolution layers, as well as component according strictly mostly on both F1 and F2 results. The appropriate parametric numbers then were chosen using merge. Testing then were run on a different, unrelated database. Those conclusions were really positive. 3. Therefore order to improve our method for recognizing key loggers files with very long trial databases, we would examine various factors.

Key Words

Machine Learning-Based Malicious App Detection of Android

Cite This Article

"Machine Learning-Based Malicious App Detection of Android", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.10, Issue 5, page no.e108-e113, May-2023, Available :http://www.jetir.org/papers/JETIR2305414.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Machine Learning-Based Malicious App Detection of Android", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.10, Issue 5, page no. ppe108-e113, May-2023, Available at : http://www.jetir.org/papers/JETIR2305414.pdf

Publication Details

Published Paper ID: JETIR2305414
Registration ID: 515246
Published In: Volume 10 | Issue 5 | Year May-2023
DOI (Digital Object Identifier):
Page No: e108-e113
Country: -, -, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000204

Print This Page

Current Call For Paper

Jetir RMS