Skip to main content
Loading...
Scholar9 logo True scholar network
  • Login/Sign up
  • Scholar9
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
  • Login/Sign up
  • Back to Top

    Transparent Peer Review By Scholar9

    Advanced Malware Detection: Leveraging Hybrid Machine Learning and Deep Learning Models on App Metadata

    Abstract

    As mobile applications become more widespread, the risk of malware threats has also escalated, creating an urgent need for more advanced detection techniques to protect both user data and system stability. This paper presents a sophisticated malware detection system that combines machine learning and deep learning methods to improve both the accuracy and efficiency of threat detection. The system utilizes a wide array of application characteristics—such as size, download frequency, pricing, categories, update history, version details, user reviews, and content types—to detect and classify potential malware. By employing a variety of algorithms, including Random Forest, Support Vector Machines (SVM), Decision Trees, and Logis- tic Regression, in conjunction with deep learning models, the system achieves superior performance over traditional detection techniques. Extensive experiments were conducted to assess the effectiveness of these methods, with the results illustrated through bar graphs, pie charts, and histograms. This research not only provides a comparative evaluation of multiple detection tech- niques but also contributes to enhancing cybersecurity strategies within the ever-evolving realm of mobile applications.

    Reviewer Photo

    Vijay Bhasker Reddy Bhimanapati Reviewer

    badge Review Request Accepted
    Reviewer Photo

    Vijay Bhasker Reddy Bhimanapati Reviewer

    23 Sep 2024 02:32 PM

    badge Approved

    Relevance and Originality

    Methodology

    Validity & Reliability

    Clarity and Structure

    Results and Analysis

    Relevance and Originality

    The paper addresses a significant and timely issue in cybersecurity by focusing on the increasing risk of malware in mobile applications. By proposing an advanced detection system that integrates machine learning and deep learning, the research offers original insights that are crucial for enhancing threat detection capabilities in a rapidly evolving technological landscape.


    Methodology

    The use of a sophisticated malware detection system that analyzes various application characteristics is commendable. The combination of algorithms—including Random Forest, Support Vector Machines (SVM), Decision Trees, and Logistic Regression—alongside deep learning models demonstrates a thorough methodological approach. However, additional details about the dataset used and the criteria for algorithm selection would strengthen the methodological framework.


    Validity & Reliability

    The extensive experiments conducted to assess the detection system's effectiveness are a strong aspect of the study. Including information on the size and diversity of the dataset, as well as performance metrics (such as accuracy and recall), would enhance the validity of the findings. Discussing any potential biases or limitations in the data collection process would also contribute to a more robust evaluation of reliability.


    Clarity and Structure

    The summary effectively communicates the paper's objectives, methods, and outcomes. However, improving the structure by clearly separating sections—such as introduction, methodology, results, and conclusions—would enhance overall clarity and help readers better navigate the information.


    Result Analysis

    The findings highlight the system's superior performance compared to traditional detection techniques, which is significant for cybersecurity. Providing specific quantitative results, such as detection rates or error margins, would offer more context for the effectiveness of the proposed system. Additionally, discussing the practical implications of these findings for businesses and future research directions would enrich the analysis and its applicability in real-world scenarios.

    Publisher Logo

    IJ Publication Publisher

    Thank You Sir

    Publisher

    IJ Publication

    IJ Publication

    Reviewer

    Vijay Bhasker

    Vijay Bhasker Reddy Bhimanapati

    More Detail

    Category Icon

    Paper Category

    Computer Engineering

    Journal Icon

    Journal Name

    JETIR - Journal of Emerging Technologies and Innovative Research External Link

    Info Icon

    p-ISSN

    Info Icon

    e-ISSN

    2349-5162

    Subscribe us to get updated

    logo logo

    Scholar9 is aiming to empower the research community around the world with the help of technology & innovation. Scholar9 provides the required platform to Scholar for visibility & credibility.

    QUICKLINKS

    • What is Scholar9?
    • About Us
    • Mission Vision
    • Contact Us
    • Privacy Policy
    • Terms of Use
    • Blogs
    • FAQ

    CONTACT US

    • +91 82003 85143
    • hello@scholar9.com
    • www.scholar9.com

    © 2026 Sequence Research & Development Pvt Ltd. All Rights Reserved.

    whatsapp