Call for Paper - November 2023 Edition
IJCA solicits original research papers for the November 2023 Edition. Last date of manuscript submission is October 20, 2023. Read More

Android App Categorization using Naïve Bayes Classifier

International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 122 - Number 3
Year of Publication: 2015
Jagtap A. H
Lomte A. C

Jagtap A.h and Lomte A.c. Article: Android App Categorization using Naive Bayes Classifier. International Journal of Computer Applications 122(3):26-29, July 2015. Full text available. BibTeX

	author = {Jagtap A.h and Lomte A.c},
	title = {Article: Android App Categorization using Naive Bayes Classifier},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {122},
	number = {3},
	pages = {26-29},
	month = {July},
	note = {Full text available}


This research based on the different integrity protection against various operating based smartphones or cellular phone. A mobile phones, smartphones are essential for daily life but the smartphones based on different operating systems like Symbian, Android mobile devices may be infected malwares because of different applications like Internet app, Bluetooth, MMS, SMS. The malware is a big issue of user mobile security and the downloaded contain through the internet. The security must be provided to smartphone because in advanced the malware after they've been infected they may lose the integrity of our mobile phone. This paper investigates the evaluation and detection of malware through the data mining based technique . The research paper based on Naïve Bayes method, classifier and analysis of the result value by analysis of system. The technique of smartphone content helps to analysis the trusted party. This is mandatory provide the efficiency related to security antivirus and malware detection.


  • Xinwen Zhang, Member, IEEE, Jean-Pierre Seifert, Member, IEEE, and Onur Aciic¸mez, Member, IEEE "Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms," IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13, NO. 1, JANUARY 2014
  • McAfee, "Mobile Security Report 2008," http://www. mcafee. com/us/research/mobile_security_report_2008. html, 2008
  • D. D. Clark and D. R. Wilson, "A Comparison of Commercial and Military Computer Security Policies," Proc. IEEE Symp. Security and Privacy, 1987
  • K. J. Biba, "Integrity Consideration for Secure Computer System, "Technical Report TR-3153, Mitre Corp. , 1977.
  • A. Bose and K. Shin, "Proactive Security for Mobile Messaging Networks," Proc. ACM Workshop Wireless Security, 2006
  • G. Hu and D. Venugopal, "A Malware Signature Extraction and Detection Method Applied to Mobile Networks," Proc. IEEE 26th Int'l Performance, Computing, and Comm. Conf. , 2007.
  • Wikipedia ,"Precision and recall - Wikipedia, the free encyclopedia"
  • www. google. com /"Naive Bayes Classifier"
  • P. Loscocco and S. Smalley, "Integrating Flexible Support for Security Policies into the Linux Operating System," Proc. USENIX Ann. Technical Conf. , pp. 29-42, June 2001