Skip to main content
. 2023 Jan 30;82(13):20269–20281. doi: 10.1007/s11042-023-14400-6

Table 3.

Malware detection techniques

Signature-based techniques Machine Learning-based techniques
Name Release Year Reference Name Release Year Reference
LimonDroid 2021 [47] Chen et al. 2018 [9]
Dimolianis et al. 2021 [13] Hatcher et al. 2016 [18]
The AMD framework 2020 [35] Feizollah et al. 2013 [14]
FOSS 2018 [19] ML-SMEPF 2021 [49]
Savenko et al. 2019 [42] MLCD 2020 [29]
Venugopal and Hu 2018 [48] IntruDTree 2020 [41]
SafeGuard 2017 [21] Bosaeed et al. 2020 [5]
SensDroid 2019 [44] AVIS 2018 [22]
Arif et al. 2021 [3]