Android Security Vulnerabilities, Malware, Anti-Malware Solutions, and Evasion Techniques Article Swipe
YOU?
·
· 2024
· Open Access
·
· DOI: https://doi.org/10.62019/abbdm.v4i4.252
This paper investigates the vulnerabilities inherent in the Android operating system architecture and examines how malware developers exploit these weaknesses to execute a variety of attacks. These include aggressive advertising, remote control capabilities, financial fraud, privilege escalation, and the leaking of sensitive information. In this paper, we survey a collection of anti-malware techniques and organize these techniques into three canonical classes (static methods, dynamic methods, hybrid methodologies) according to how they are used or implemented with respect to the host operating system. We also evaluate the effectiveness of these techniques against certain types of attacks and summarize them under test categories for reporting results. We also examine the typical countermeasures used by malware authors to disguise their approaches against existing detection methods, such as reintegrating with real applications, using update payloads, executing dynamic code, scrambling dangerous content, and setting traps to act upon only purposely triggered situations. In future work, we suggest research into the capability of reinforcement learning methods to further increase sustainability and adaptability of anti-malware strategies. This Research study aimed at creating more dynamic detection systems for malware by utilizing machine learning techniques that could change in parallel with the tactics used by malware developers. By leveraging this technique, you could drastically boost the efficacy of existing anti-malware solutions that are unable to respond to new threats. As the digital environment changes (and continues to change), Mobile provides threat analysts, fraud / security managers and legal authorities up-to-date circumstantial direction so users can move with confidence within their mobile landscapes.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.62019/abbdm.v4i4.252
- https://abbdm.com/index.php/Journal/article/download/252/215
- OA Status
- diamond
- References
- 15
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4405682593
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4405682593Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.62019/abbdm.v4i4.252Digital Object Identifier
- Title
-
Android Security Vulnerabilities, Malware, Anti-Malware Solutions, and Evasion TechniquesWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2024Year of publication
- Publication date
-
2024-12-22Full publication date if available
- Authors
-
Muhammad Khalid, Ahthasham Sajid, Muhammad Usman, M Hamid Saeed, Malik Muhammad Nadeem, Ishu SharmaList of authors in order
- Landing page
-
https://doi.org/10.62019/abbdm.v4i4.252Publisher landing page
- PDF URL
-
https://abbdm.com/index.php/Journal/article/download/252/215Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://abbdm.com/index.php/Journal/article/download/252/215Direct OA link when available
- Concepts
-
Malware, Android malware, Evasion (ethics), Computer security, Android (operating system), Computer science, Cryptovirology, Internet privacy, Android application, Operating system, Medicine, Immunology, Immune systemTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
15Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4405682593 |
|---|---|
| doi | https://doi.org/10.62019/abbdm.v4i4.252 |
| ids.doi | https://doi.org/10.62019/abbdm.v4i4.252 |
| ids.openalex | https://openalex.org/W4405682593 |
| fwci | 0.0 |
| type | article |
| title | Android Security Vulnerabilities, Malware, Anti-Malware Solutions, and Evasion Techniques |
| biblio.issue | 4 |
| biblio.volume | 4 |
| biblio.last_page | 133 |
| biblio.first_page | 117 |
| topics[0].id | https://openalex.org/T11241 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9988999962806702 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1711 |
| topics[0].subfield.display_name | Signal Processing |
| topics[0].display_name | Advanced Malware Detection Techniques |
| topics[1].id | https://openalex.org/T12034 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9598000049591064 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1710 |
| topics[1].subfield.display_name | Information Systems |
| topics[1].display_name | Digital and Cyber Forensics |
| topics[2].id | https://openalex.org/T12799 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9379000067710876 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | Mobile and Web Applications |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C541664917 |
| concepts[0].level | 2 |
| concepts[0].score | 0.8743689060211182 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q14001 |
| concepts[0].display_name | Malware |
| concepts[1].id | https://openalex.org/C2989133298 |
| concepts[1].level | 3 |
| concepts[1].score | 0.8263257741928101 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q94 |
| concepts[1].display_name | Android malware |
| concepts[2].id | https://openalex.org/C2781251061 |
| concepts[2].level | 3 |
| concepts[2].score | 0.7994770407676697 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q5416089 |
| concepts[2].display_name | Evasion (ethics) |
| concepts[3].id | https://openalex.org/C38652104 |
| concepts[3].level | 1 |
| concepts[3].score | 0.7668355703353882 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[3].display_name | Computer security |
| concepts[4].id | https://openalex.org/C557433098 |
| concepts[4].level | 2 |
| concepts[4].score | 0.6520888805389404 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q94 |
| concepts[4].display_name | Android (operating system) |
| concepts[5].id | https://openalex.org/C41008148 |
| concepts[5].level | 0 |
| concepts[5].score | 0.5928450226783752 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[5].display_name | Computer science |
| concepts[6].id | https://openalex.org/C84525096 |
| concepts[6].level | 3 |
| concepts[6].score | 0.5374845266342163 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q3506050 |
| concepts[6].display_name | Cryptovirology |
| concepts[7].id | https://openalex.org/C108827166 |
| concepts[7].level | 1 |
| concepts[7].score | 0.5085510015487671 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q175975 |
| concepts[7].display_name | Internet privacy |
| concepts[8].id | https://openalex.org/C3017891749 |
| concepts[8].level | 3 |
| concepts[8].score | 0.41864678263664246 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q94 |
| concepts[8].display_name | Android application |
| concepts[9].id | https://openalex.org/C111919701 |
| concepts[9].level | 1 |
| concepts[9].score | 0.26266396045684814 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[9].display_name | Operating system |
| concepts[10].id | https://openalex.org/C71924100 |
| concepts[10].level | 0 |
| concepts[10].score | 0.04854986071586609 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q11190 |
| concepts[10].display_name | Medicine |
| concepts[11].id | https://openalex.org/C203014093 |
| concepts[11].level | 1 |
| concepts[11].score | 0.0 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q101929 |
| concepts[11].display_name | Immunology |
| concepts[12].id | https://openalex.org/C8891405 |
| concepts[12].level | 2 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q1059 |
| concepts[12].display_name | Immune system |
| keywords[0].id | https://openalex.org/keywords/malware |
| keywords[0].score | 0.8743689060211182 |
| keywords[0].display_name | Malware |
| keywords[1].id | https://openalex.org/keywords/android-malware |
| keywords[1].score | 0.8263257741928101 |
| keywords[1].display_name | Android malware |
| keywords[2].id | https://openalex.org/keywords/evasion |
| keywords[2].score | 0.7994770407676697 |
| keywords[2].display_name | Evasion (ethics) |
| keywords[3].id | https://openalex.org/keywords/computer-security |
| keywords[3].score | 0.7668355703353882 |
| keywords[3].display_name | Computer security |
| keywords[4].id | https://openalex.org/keywords/android |
| keywords[4].score | 0.6520888805389404 |
| keywords[4].display_name | Android (operating system) |
| keywords[5].id | https://openalex.org/keywords/computer-science |
| keywords[5].score | 0.5928450226783752 |
| keywords[5].display_name | Computer science |
| keywords[6].id | https://openalex.org/keywords/cryptovirology |
| keywords[6].score | 0.5374845266342163 |
| keywords[6].display_name | Cryptovirology |
| keywords[7].id | https://openalex.org/keywords/internet-privacy |
| keywords[7].score | 0.5085510015487671 |
| keywords[7].display_name | Internet privacy |
| keywords[8].id | https://openalex.org/keywords/android-application |
| keywords[8].score | 0.41864678263664246 |
| keywords[8].display_name | Android application |
| keywords[9].id | https://openalex.org/keywords/operating-system |
| keywords[9].score | 0.26266396045684814 |
| keywords[9].display_name | Operating system |
| keywords[10].id | https://openalex.org/keywords/medicine |
| keywords[10].score | 0.04854986071586609 |
| keywords[10].display_name | Medicine |
| language | en |
| locations[0].id | doi:10.62019/abbdm.v4i4.252 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S5407037901 |
| locations[0].source.issn | 2959-0795, 2959-0809 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2959-0795 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | The Asian Bulletin of Big Data Management |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | cc-by-nc-nd |
| locations[0].pdf_url | https://abbdm.com/index.php/Journal/article/download/252/215 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc-nd |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | The Asian Bulletin of Big Data Management |
| locations[0].landing_page_url | https://doi.org/10.62019/abbdm.v4i4.252 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5074278113 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-1615-1498 |
| authorships[0].author.display_name | Muhammad Khalid |
| authorships[0].countries | PK |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I195024194 |
| authorships[0].affiliations[0].raw_affiliation_string | Department of Information Security and Data Science, Riphah Institute of Systems Engineering, Riphah International University Islamabad, Pakistan |
| authorships[0].institutions[0].id | https://openalex.org/I195024194 |
| authorships[0].institutions[0].ror | https://ror.org/02kdm5630 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I195024194 |
| authorships[0].institutions[0].country_code | PK |
| authorships[0].institutions[0].display_name | Riphah International University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Mahtab Khalid |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Department of Information Security and Data Science, Riphah Institute of Systems Engineering, Riphah International University Islamabad, Pakistan |
| authorships[1].author.id | https://openalex.org/A5056886115 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-2829-0893 |
| authorships[1].author.display_name | Ahthasham Sajid |
| authorships[1].countries | PK |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I195024194 |
| authorships[1].affiliations[0].raw_affiliation_string | Riphah Institute of Systems Engineering, Riphah International University, Islamabad |
| authorships[1].institutions[0].id | https://openalex.org/I195024194 |
| authorships[1].institutions[0].ror | https://ror.org/02kdm5630 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I195024194 |
| authorships[1].institutions[0].country_code | PK |
| authorships[1].institutions[0].display_name | Riphah International University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Ahthasham Sajid |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Riphah Institute of Systems Engineering, Riphah International University, Islamabad |
| authorships[2].author.id | https://openalex.org/A5055573564 |
| authorships[2].author.orcid | https://orcid.org/0000-0003-1919-862X |
| authorships[2].author.display_name | Muhammad Usman |
| authorships[2].countries | PK |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I195024194 |
| authorships[2].affiliations[0].raw_affiliation_string | Department of Information Security and Data Science, Riphah Institute of Systems Engineering, Riphah International University Islamabad, Pakistan |
| authorships[2].institutions[0].id | https://openalex.org/I195024194 |
| authorships[2].institutions[0].ror | https://ror.org/02kdm5630 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I195024194 |
| authorships[2].institutions[0].country_code | PK |
| authorships[2].institutions[0].display_name | Riphah International University |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Muhammad Usman |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Department of Information Security and Data Science, Riphah Institute of Systems Engineering, Riphah International University Islamabad, Pakistan |
| authorships[3].author.id | https://openalex.org/A5102355497 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | M Hamid Saeed |
| authorships[3].countries | PK |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I195024194 |
| authorships[3].affiliations[0].raw_affiliation_string | Department of Information Security and Data Science, Riphah Institute of Systems Engineering, Riphah International University Islamabad, Pakistan |
| authorships[3].institutions[0].id | https://openalex.org/I195024194 |
| authorships[3].institutions[0].ror | https://ror.org/02kdm5630 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I195024194 |
| authorships[3].institutions[0].country_code | PK |
| authorships[3].institutions[0].display_name | Riphah International University |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Mehak Saeed |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Department of Information Security and Data Science, Riphah Institute of Systems Engineering, Riphah International University Islamabad, Pakistan |
| authorships[4].author.id | https://openalex.org/A5107418165 |
| authorships[4].author.orcid | |
| authorships[4].author.display_name | Malik Muhammad Nadeem |
| authorships[4].countries | PK |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I195024194 |
| authorships[4].affiliations[0].raw_affiliation_string | Department of Information Security and Data Science, Riphah Institute of Systems Engineering, Riphah International University Islamabad, Pakistan |
| authorships[4].institutions[0].id | https://openalex.org/I195024194 |
| authorships[4].institutions[0].ror | https://ror.org/02kdm5630 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I195024194 |
| authorships[4].institutions[0].country_code | PK |
| authorships[4].institutions[0].display_name | Riphah International University |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Malik Muhammad Nadeem |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Department of Information Security and Data Science, Riphah Institute of Systems Engineering, Riphah International University Islamabad, Pakistan |
| authorships[5].author.id | https://openalex.org/A5035830349 |
| authorships[5].author.orcid | https://orcid.org/0000-0003-1669-3393 |
| authorships[5].author.display_name | Ishu Sharma |
| authorships[5].countries | IN |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I101407740 |
| authorships[5].affiliations[0].raw_affiliation_string | Chandigarh Group of Colleges, Jhanjeri, Mohali, India |
| authorships[5].institutions[0].id | https://openalex.org/I101407740 |
| authorships[5].institutions[0].ror | https://ror.org/05t4pvx35 |
| authorships[5].institutions[0].type | education |
| authorships[5].institutions[0].lineage | https://openalex.org/I101407740 |
| authorships[5].institutions[0].country_code | IN |
| authorships[5].institutions[0].display_name | Chandigarh University |
| authorships[5].author_position | last |
| authorships[5].raw_author_name | Ishu Sharma |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | Chandigarh Group of Colleges, Jhanjeri, Mohali, India |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://abbdm.com/index.php/Journal/article/download/252/215 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Android Security Vulnerabilities, Malware, Anti-Malware Solutions, and Evasion Techniques |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11241 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9988999962806702 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1711 |
| primary_topic.subfield.display_name | Signal Processing |
| primary_topic.display_name | Advanced Malware Detection Techniques |
| related_works | https://openalex.org/W3195312353, https://openalex.org/W2470029541, https://openalex.org/W4383468964, https://openalex.org/W3200508744, https://openalex.org/W4387065217, https://openalex.org/W2470502009, https://openalex.org/W4312234627, https://openalex.org/W2507113366, https://openalex.org/W2717179875, https://openalex.org/W2462192250 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.62019/abbdm.v4i4.252 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S5407037901 |
| best_oa_location.source.issn | 2959-0795, 2959-0809 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2959-0795 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | The Asian Bulletin of Big Data Management |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | cc-by-nc-nd |
| best_oa_location.pdf_url | https://abbdm.com/index.php/Journal/article/download/252/215 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | The Asian Bulletin of Big Data Management |
| best_oa_location.landing_page_url | https://doi.org/10.62019/abbdm.v4i4.252 |
| primary_location.id | doi:10.62019/abbdm.v4i4.252 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S5407037901 |
| primary_location.source.issn | 2959-0795, 2959-0809 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2959-0795 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | The Asian Bulletin of Big Data Management |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | cc-by-nc-nd |
| primary_location.pdf_url | https://abbdm.com/index.php/Journal/article/download/252/215 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | The Asian Bulletin of Big Data Management |
| primary_location.landing_page_url | https://doi.org/10.62019/abbdm.v4i4.252 |
| publication_date | 2024-12-22 |
| publication_year | 2024 |
| referenced_works | https://openalex.org/W2574022511, https://openalex.org/W3119955105, https://openalex.org/W4226331924, https://openalex.org/W4367603304, https://openalex.org/W4200493858, https://openalex.org/W3125601055, https://openalex.org/W2767371019, https://openalex.org/W2559116024, https://openalex.org/W2046159847, https://openalex.org/W4244726870, https://openalex.org/W2060537671, https://openalex.org/W2735392951, https://openalex.org/W2125011234, https://openalex.org/W2620858425, https://openalex.org/W3005176213 |
| referenced_works_count | 15 |
| abstract_inverted_index./ | 234 |
| abstract_inverted_index.a | 22, 48 |
| abstract_inverted_index.As | 220 |
| abstract_inverted_index.By | 198 |
| abstract_inverted_index.In | 43, 147 |
| abstract_inverted_index.We | 82, 104 |
| abstract_inverted_index.as | 123 |
| abstract_inverted_index.at | 173 |
| abstract_inverted_index.by | 111, 181, 195 |
| abstract_inverted_index.in | 6, 189 |
| abstract_inverted_index.of | 24, 40, 50, 87, 93, 156, 166, 208 |
| abstract_inverted_index.or | 73 |
| abstract_inverted_index.so | 243 |
| abstract_inverted_index.to | 20, 68, 77, 114, 140, 160, 215, 217, 227 |
| abstract_inverted_index.we | 46, 150 |
| abstract_inverted_index.act | 141 |
| abstract_inverted_index.and | 12, 37, 53, 95, 137, 164, 237 |
| abstract_inverted_index.are | 71, 213 |
| abstract_inverted_index.can | 245 |
| abstract_inverted_index.for | 101, 179 |
| abstract_inverted_index.how | 14, 69 |
| abstract_inverted_index.new | 218 |
| abstract_inverted_index.the | 3, 7, 38, 78, 85, 107, 154, 192, 206, 221 |
| abstract_inverted_index.you | 202 |
| abstract_inverted_index.(and | 225 |
| abstract_inverted_index.This | 0, 169 |
| abstract_inverted_index.also | 83, 105 |
| abstract_inverted_index.host | 79 |
| abstract_inverted_index.into | 57, 153 |
| abstract_inverted_index.more | 175 |
| abstract_inverted_index.move | 246 |
| abstract_inverted_index.only | 143 |
| abstract_inverted_index.real | 126 |
| abstract_inverted_index.such | 122 |
| abstract_inverted_index.test | 99 |
| abstract_inverted_index.that | 186, 212 |
| abstract_inverted_index.them | 97 |
| abstract_inverted_index.they | 70 |
| abstract_inverted_index.this | 44, 200 |
| abstract_inverted_index.upon | 142 |
| abstract_inverted_index.used | 72, 110, 194 |
| abstract_inverted_index.with | 75, 125, 191, 247 |
| abstract_inverted_index.These | 26 |
| abstract_inverted_index.aimed | 172 |
| abstract_inverted_index.boost | 205 |
| abstract_inverted_index.code, | 133 |
| abstract_inverted_index.could | 187, 203 |
| abstract_inverted_index.fraud | 233 |
| abstract_inverted_index.legal | 238 |
| abstract_inverted_index.paper | 1 |
| abstract_inverted_index.study | 171 |
| abstract_inverted_index.their | 116, 250 |
| abstract_inverted_index.these | 18, 55, 88 |
| abstract_inverted_index.three | 58 |
| abstract_inverted_index.traps | 139 |
| abstract_inverted_index.types | 92 |
| abstract_inverted_index.under | 98 |
| abstract_inverted_index.users | 244 |
| abstract_inverted_index.using | 128 |
| abstract_inverted_index.work, | 149 |
| abstract_inverted_index.Mobile | 229 |
| abstract_inverted_index.change | 188 |
| abstract_inverted_index.fraud, | 34 |
| abstract_inverted_index.future | 148 |
| abstract_inverted_index.hybrid | 65 |
| abstract_inverted_index.mobile | 251 |
| abstract_inverted_index.paper, | 45 |
| abstract_inverted_index.remote | 30 |
| abstract_inverted_index.survey | 47 |
| abstract_inverted_index.system | 10 |
| abstract_inverted_index.threat | 231 |
| abstract_inverted_index.unable | 214 |
| abstract_inverted_index.update | 129 |
| abstract_inverted_index.within | 249 |
| abstract_inverted_index.(static | 61 |
| abstract_inverted_index.Android | 8 |
| abstract_inverted_index.against | 90, 118 |
| abstract_inverted_index.attacks | 94 |
| abstract_inverted_index.authors | 113 |
| abstract_inverted_index.certain | 91 |
| abstract_inverted_index.changes | 224 |
| abstract_inverted_index.classes | 60 |
| abstract_inverted_index.control | 31 |
| abstract_inverted_index.digital | 222 |
| abstract_inverted_index.dynamic | 63, 132, 176 |
| abstract_inverted_index.examine | 106 |
| abstract_inverted_index.execute | 21 |
| abstract_inverted_index.exploit | 17 |
| abstract_inverted_index.further | 161 |
| abstract_inverted_index.include | 27 |
| abstract_inverted_index.leaking | 39 |
| abstract_inverted_index.machine | 183 |
| abstract_inverted_index.malware | 15, 112, 180, 196 |
| abstract_inverted_index.methods | 159 |
| abstract_inverted_index.respect | 76 |
| abstract_inverted_index.respond | 216 |
| abstract_inverted_index.setting | 138 |
| abstract_inverted_index.suggest | 151 |
| abstract_inverted_index.system. | 81 |
| abstract_inverted_index.systems | 178 |
| abstract_inverted_index.tactics | 193 |
| abstract_inverted_index.typical | 108 |
| abstract_inverted_index.variety | 23 |
| abstract_inverted_index.Research | 170 |
| abstract_inverted_index.attacks. | 25 |
| abstract_inverted_index.change), | 228 |
| abstract_inverted_index.content, | 136 |
| abstract_inverted_index.creating | 174 |
| abstract_inverted_index.disguise | 115 |
| abstract_inverted_index.efficacy | 207 |
| abstract_inverted_index.evaluate | 84 |
| abstract_inverted_index.examines | 13 |
| abstract_inverted_index.existing | 119, 209 |
| abstract_inverted_index.increase | 162 |
| abstract_inverted_index.inherent | 5 |
| abstract_inverted_index.learning | 158, 184 |
| abstract_inverted_index.managers | 236 |
| abstract_inverted_index.methods, | 62, 64, 121 |
| abstract_inverted_index.organize | 54 |
| abstract_inverted_index.parallel | 190 |
| abstract_inverted_index.provides | 230 |
| abstract_inverted_index.research | 152 |
| abstract_inverted_index.results. | 103 |
| abstract_inverted_index.security | 235 |
| abstract_inverted_index.threats. | 219 |
| abstract_inverted_index.according | 67 |
| abstract_inverted_index.analysts, | 232 |
| abstract_inverted_index.canonical | 59 |
| abstract_inverted_index.continues | 226 |
| abstract_inverted_index.dangerous | 135 |
| abstract_inverted_index.detection | 120, 177 |
| abstract_inverted_index.direction | 242 |
| abstract_inverted_index.executing | 131 |
| abstract_inverted_index.financial | 33 |
| abstract_inverted_index.operating | 9, 80 |
| abstract_inverted_index.payloads, | 130 |
| abstract_inverted_index.privilege | 35 |
| abstract_inverted_index.purposely | 144 |
| abstract_inverted_index.reporting | 102 |
| abstract_inverted_index.sensitive | 41 |
| abstract_inverted_index.solutions | 211 |
| abstract_inverted_index.summarize | 96 |
| abstract_inverted_index.triggered | 145 |
| abstract_inverted_index.utilizing | 182 |
| abstract_inverted_index.aggressive | 28 |
| abstract_inverted_index.approaches | 117 |
| abstract_inverted_index.capability | 155 |
| abstract_inverted_index.categories | 100 |
| abstract_inverted_index.collection | 49 |
| abstract_inverted_index.confidence | 248 |
| abstract_inverted_index.developers | 16 |
| abstract_inverted_index.leveraging | 199 |
| abstract_inverted_index.scrambling | 134 |
| abstract_inverted_index.technique, | 201 |
| abstract_inverted_index.techniques | 52, 56, 89, 185 |
| abstract_inverted_index.up-to-date | 240 |
| abstract_inverted_index.weaknesses | 19 |
| abstract_inverted_index.authorities | 239 |
| abstract_inverted_index.developers. | 197 |
| abstract_inverted_index.drastically | 204 |
| abstract_inverted_index.environment | 223 |
| abstract_inverted_index.escalation, | 36 |
| abstract_inverted_index.implemented | 74 |
| abstract_inverted_index.landscapes. | 252 |
| abstract_inverted_index.situations. | 146 |
| abstract_inverted_index.strategies. | 168 |
| abstract_inverted_index.adaptability | 165 |
| abstract_inverted_index.advertising, | 29 |
| abstract_inverted_index.anti-malware | 51, 167, 210 |
| abstract_inverted_index.architecture | 11 |
| abstract_inverted_index.information. | 42 |
| abstract_inverted_index.investigates | 2 |
| abstract_inverted_index.applications, | 127 |
| abstract_inverted_index.capabilities, | 32 |
| abstract_inverted_index.effectiveness | 86 |
| abstract_inverted_index.reinforcement | 157 |
| abstract_inverted_index.reintegrating | 124 |
| abstract_inverted_index.circumstantial | 241 |
| abstract_inverted_index.methodologies) | 66 |
| abstract_inverted_index.sustainability | 163 |
| abstract_inverted_index.countermeasures | 109 |
| abstract_inverted_index.vulnerabilities | 4 |
| cited_by_percentile_year | |
| countries_distinct_count | 2 |
| institutions_distinct_count | 6 |
| citation_normalized_percentile.value | 0.32652652 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |