CFP last date
20 June 2024
Reseach Article

Android App Categorization using Naive Bayes Classifier

by Jagtap A.h, Lomte A.c
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 122 - Number 3
Year of Publication: 2015
Authors: Jagtap A.h, Lomte A.c

Jagtap A.h, Lomte A.c . Android App Categorization using Naive Bayes Classifier. International Journal of Computer Applications. 122, 3 ( July 2015), 26-29. DOI=10.5120/21683-4783

@article{ 10.5120/21683-4783,
author = { Jagtap A.h, Lomte A.c },
title = { Android App Categorization using Naive Bayes Classifier },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 122 },
number = { 3 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 26-29 },
numpages = {9},
url = { },
doi = { 10.5120/21683-4783 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T23:09:38.673986+05:30
%A Jagtap A.h
%A Lomte A.c
%T Android App Categorization using Naive Bayes Classifier
%J International Journal of Computer Applications
%@ 0975-8887
%V 122
%N 3
%P 26-29
%D 2015
%I Foundation of Computer Science (FCS), NY, USA

This research based on the different integrity protection against various operating based smartphones or cellular phone. A mobile phones, smartphones are essential for daily life but the smartphones based on different operating systems like Symbian, Android mobile devices may be infected malwares because of different applications like Internet app, Bluetooth, MMS, SMS. The malware is a big issue of user mobile security and the downloaded contain through the internet. The security must be provided to smartphone because in advanced the malware after they've been infected they may lose the integrity of our mobile phone. This paper investigates the evaluation and detection of malware through the data mining based technique . The research paper based on Naïve Bayes method, classifier and analysis of the result value by analysis of system. The technique of smartphone content helps to analysis the trusted party. This is mandatory provide the efficiency related to security antivirus and malware detection.

  1. Xinwen Zhang, Member, IEEE, Jean-Pierre Seifert, Member, IEEE, and Onur Aciic¸mez, Member, IEEE "Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms," IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13, NO. 1, JANUARY 2014
  2. McAfee, "Mobile Security Report 2008," http://www. mcafee. com/us/research/mobile_security_report_2008. html, 2008
  3. D. D. Clark and D. R. Wilson, "A Comparison of Commercial and Military Computer Security Policies," Proc. IEEE Symp. Security and Privacy, 1987
  4. K. J. Biba, "Integrity Consideration for Secure Computer System, "Technical Report TR-3153, Mitre Corp. , 1977.
  5. A. Bose and K. Shin, "Proactive Security for Mobile Messaging Networks," Proc. ACM Workshop Wireless Security, 2006
  6. G. Hu and D. Venugopal, "A Malware Signature Extraction and Detection Method Applied to Mobile Networks," Proc. IEEE 26th Int'l Performance, Computing, and Comm. Conf. , 2007.
  7. Wikipedia ,"Precision and recall - Wikipedia, the free encyclopedia"
  8. www. google. com /"Naive Bayes Classifier"
  9. P. Loscocco and S. Smalley, "Integrating Flexible Support for Security Policies into the Linux Operating System," Proc. USENIX Ann. Technical Conf. , pp. 29-42, June 2001
Index Terms

Computer Science
Information Sciences


Android Mobile security Data Mining