FRAUD AND MALWARE DETECTION FROM ANDROID APPLICATIONS USING THE SUPPORT VECTOR MACHINE
DOI:
https://doi.org/10.48047/Keywords:
Machine Learning, E-mails, Networks, Malware Analysis, Feature Extraction, SVM and feature extractionAbstract
Intrusion Recognition method is software which is utilized for observing network as well as securing from attacker. Due to tremendous change in these modern technology areas of new applications has been introduced. Mean while areas in Commercial business, finance, industrial, protection and health safety sectors the Local area network as well as the wide area
network apps has been emerged.
Downloads
Download data is not yet available.
Downloads
Published
2020-10-28
Issue
Section
Articles