Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

Malware attacks in 2018 by mobile device.

More »

Fig 1 Expand

Fig 2.

New Android malware samples 2012–2018.

More »

Fig 2 Expand

Fig 3.

Taxonomy of malware intrusion detection systems.

More »

Fig 3 Expand

Table 1.

Related work in static analysis.

More »

Table 1 Expand

Fig 4.

Taxonomy of Android malware features.

More »

Fig 4 Expand

Table 2.

Android permission protection level.

More »

Table 2 Expand

Fig 5.

Malware detection system.

More »

Fig 5 Expand

Table 3.

Dataset summary.

More »

Table 3 Expand

Fig 6.

Data collection process.

More »

Fig 6 Expand

Table 4.

10 most frequent permission requests in malware and benign applications.

More »

Table 4 Expand

Fig 7.

Comparison of total permission requests by malware and benign applications.

More »

Fig 7 Expand

Table 5.

Description of the ten highest permission requests by malware applications.

More »

Table 5 Expand

Table 6.

20 features selection of PSO.

More »

Table 6 Expand

Table 7.

20 features selection of information gain.

More »

Table 7 Expand

Table 8.

20 features selection of evolutionary computation.

More »

Table 8 Expand

Table 9.

Results of detection performance.

More »

Table 9 Expand

Fig 8.

Receiver operating characteristic curve.

More »

Fig 8 Expand

Table 10.

Evaluation of AUC.

More »

Table 10 Expand

Fig 9.

Precision.

More »

Fig 9 Expand

Fig 10.

Recall.

More »

Fig 10 Expand

Fig 11.

F-Measure.

More »

Fig 11 Expand

Table 11.

Comparative study with related work.

More »

Table 11 Expand