Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/480200
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2023-04-28T17:08:27Z-
dc.date.available2023-04-28T17:08:27Z-
dc.identifier.urihttp://hdl.handle.net/10603/480200-
dc.description.abstractSmartphones are used to initiate the intervention of humans with machines. Therefore, newlinelow-cost hardware and high-speed internet make smartphones ubiquitously crucial in newlineany process. Almost everyone uses a smartphone with an android-based operating newlinesystem for more manageable growth in daily life and several business applications. The newlinehigher connectivity of billions of smartphone users creates serious security threats to newlinethe Android operating system. The versatile coverage and easier accessibility of every newlineapplication make the android system a key target for attackers. There are several newlineapplications in daily life, like bank transactions, etc., that require full details of senders newlineand receivers stored somewhere in the cloud. In our study of several research articles newlinefound in the Android ecosystem, there are various defies to analyze Android Malware newlineApps. Normally an attacker downloads various popular APKs from the google playstore disassembles the downloaded Apk, embeds it with malicious code (malware code newlineor adware code) assembles it into Repackaged App, and uploads it to a third party. newlineIn such repackage android systems (such as smart watches, palm devices, smart TV, newlineMobiles, recent IOT Devices, etc.), there was a need to detect the malware. there have newlinebeen various defies to identifying Android malware. Most existing outmoded systems newline(such as static, dynamic, and hybrid approaches proposed by many researchers during newlinethe last decade needed a high rate of human intervention which needs the inspection of newlineAPK file structures, which has amounting to increased computation time, high newlineprocessing power, more storage space and time-consuming. newline
dc.format.extent
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleA Novel Approach for Detection and Analysis of Malware for Smart Devices
dc.title.alternative
dc.creator.researcherKhan, Mohd Abdul Rahim
dc.subject.keywordComputer Science
dc.subject.keywordComputer Science Software Engineering
dc.subject.keywordEngineering and Technology
dc.description.note
dc.contributor.guideKumar, Nand
dc.publisher.placeFaridabad
dc.publisher.universityLingayas University
dc.publisher.institutionDepartment of Computer Science and Engineering
dc.date.registered2018
dc.date.completed2022
dc.date.awarded2022
dc.format.dimensions
dc.format.accompanyingmaterialNone
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File298.8 kBAdobe PDFView/Open
02_prelim pages.pdf399.98 kBAdobe PDFView/Open
03_content.pdf360.05 kBAdobe PDFView/Open
04_abstract.pdf17.71 kBAdobe PDFView/Open
05_chapter 1.pdf386.53 kBAdobe PDFView/Open
06_chapter 2.pdf164.9 kBAdobe PDFView/Open
07_chapter 3.pdf315.13 kBAdobe PDFView/Open
08_chapter 4.pdf671.02 kBAdobe PDFView/Open
09_chapter 5.pdf372.68 kBAdobe PDFView/Open
10_chapter 6.pdf749.02 kBAdobe PDFView/Open
11_chapter 7.pdf339.07 kBAdobe PDFView/Open
12_chapter 8.pdf629.43 kBAdobe PDFView/Open
13_chapter 9.pdf1.18 MBAdobe PDFView/Open
14_chapter 10.pdf5.66 kBAdobe PDFView/Open
15_annexures.pdf1.07 MBAdobe PDFView/Open
80_recommendation.pdf1.3 MBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: