Fig 1.
Malware attacks in 2018 by mobile device.
Fig 2.
New Android malware samples 2012–2018.
Fig 3.
Taxonomy of malware intrusion detection systems.
Table 1.
Related work in static analysis.
Fig 4.
Taxonomy of Android malware features.
Table 2.
Android permission protection level.
Fig 5.
Malware detection system.
Table 3.
Dataset summary.
Fig 6.
Data collection process.
Table 4.
10 most frequent permission requests in malware and benign applications.
Fig 7.
Comparison of total permission requests by malware and benign applications.
Table 5.
Description of the ten highest permission requests by malware applications.
Table 6.
20 features selection of PSO.
Table 7.
20 features selection of information gain.
Table 8.
20 features selection of evolutionary computation.
Table 9.
Results of detection performance.
Fig 8.
Receiver operating characteristic curve.
Table 10.
Evaluation of AUC.
Fig 9.
Precision.
Fig 10.
Recall.
Fig 11.
F-Measure.
Table 11.
Comparative study with related work.