Review on Mobile Threats and Detection Techniques

  • Dua L
  • Bansal D
N/ACitations
Citations of this article
21Readers
Mendeley users who have this article in their library.

Abstract

Since last-decade, smart-phones have gained widespread usage. Mobile devices store personal details such as contacts and text messages. Due to this extensive growth, smart-phones are attracted towards cyber-criminals. In this research work, we have done a systematic review of the terms related to malware detection algorithms and have also summarized behavioral description of some known mobile malwares in tabular form. After careful solicitation of all the possible methods and algorithms for detection of mobile-based malwares, we give some recommendations for designing future malware detection algorithm by considering computational complexity and detection ration of mobile malwares.

Cite

CITATION STYLE

APA

Dua, L., & Bansal, D. (2014). Review on Mobile Threats and Detection Techniques. International Journal of Distributed and Parallel Systems, 5(4), 21–29. https://doi.org/10.5121/ijdps.2014.5403

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free