Detecting Android Malware and Sensitive Data Flows Using Machine Learning Techniques.
Ramakrishnan RamanKhyati R. NirmalAnita GehlotSnehal TrivediDimple SainR. PonnusamyPublished in: IC3I (2022)
Keyphrases
- sensitive data
- malware detection
- privacy preserving
- detect malicious
- data storage
- information security
- malicious users
- data sharing
- smart card
- sensitive information
- security concerns
- confidential data
- third party
- privacy protection
- data privacy
- privacy preservation
- mobile devices
- data confidentiality
- security threats
- protection mechanisms
- unauthorized access
- detecting malicious
- personal data
- anomaly detection
- database systems
- digital libraries
- data sets