
International Journal For Multidisciplinary Research
E-ISSN: 2582-2160
•
Impact Factor: 9.24
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Home
Research Paper
Submit Research Paper
Publication Guidelines
Publication Charges
Upload Documents
Track Status / Pay Fees / Download Publication Certi.
Editors & Reviewers
View All
Join as a Reviewer
Get Membership Certificate
Current Issue
Publication Archive
Conference
Publishing Conf. with IJFMR
Upcoming Conference(s) ↓
WSMCDD-2025
GSMCDD-2025
Conferences Published ↓
RBS:RH-COVID-19 (2023)
ICMRS'23
PIPRDA-2023
Contact Us
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 7 Issue 2
March-April 2025
Indexing Partners



















Android Trojan Identification using Machine Learning Techniques: A Review of the Literature
Author(s) | Mangala Tejaswini, Dr. M.C.Bhanu Prasad, Yerasi Sainath Reddy, Bulagondla Sai Divya Sree, Sugali Sailaja, Dayyala Praveen Kumar |
---|---|
Country | India |
Abstract | Users can search for any app on the Play Store using the interface. It if available, automatically retrieves the app's permissions list and privacy policy. To view relevant sentences from the privacy settings, users can select a specific permission strategy, alongside a reasonable clarification of what the consent involves. This makes a difference by highlighting important aspects, users quickly assess the privacy risks of Android apps sections of the privacy policy and a description of sensitive permissions. Our strategy introduces a new method for analyzing Android app privacy policies. Our apparatus makes it more obvious the security ramifications of introducing outsider apps and has already discovered issues in apps that are troubling. The tool is made to be expandable, allowing for seamless integration of future enhancements to improve efficiency and dependability. Additionally, if it is not too much work, make reference to the additional requirements in the section below under "Personal and Sensitive Information" if your app handles sensitive or personal user data. These standards for Play Google are on top of any privacy or data security laws that may be relevant. We suggested that when a client wants to introduce and use an external application, they may not understand the significance of the permissions that the application requests, so they grant all of them, allowing malicious applications to be installed and carry out their malicious activities covertly. |
Field | Engineering |
Published In | Volume 7, Issue 2, March-April 2025 |
Published On | 2025-04-16 |
DOI | https://doi.org/10.36948/ijfmr.2025.v07i02.42149 |
Short DOI | https://doi.org/g9f4w8 |
Share this

E-ISSN 2582-2160

CrossRef DOI is assigned to each research paper published in our journal.
IJFMR DOI prefix is
10.36948/ijfmr
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
