Table 3.
Malware detection techniques
| Signature-based techniques | Machine Learning-based techniques | ||||
|---|---|---|---|---|---|
| Name | Release Year | Reference | Name | Release Year | Reference |
| LimonDroid | 2021 | [47] | Chen et al. | 2018 | [9] |
| Dimolianis et al. | 2021 | [13] | Hatcher et al. | 2016 | [18] |
| The AMD framework | 2020 | [35] | Feizollah et al. | 2013 | [14] |
| FOSS | 2018 | [19] | ML-SMEPF | 2021 | [49] |
| Savenko et al. | 2019 | [42] | MLCD | 2020 | [29] |
| Venugopal and Hu | 2018 | [48] | IntruDTree | 2020 | [41] |
| SafeGuard | 2017 | [21] | Bosaeed et al. | 2020 | [5] |
| SensDroid | 2019 | [44] | AVIS | 2018 | [22] |
| Arif et al. | 2021 | [3] | |||