Search Rank Fraud and Malware Detection in Google Play
N. Valarmathi1, V. Kavitha2, K. C. Mohanraj3, S. Revathy4, E. Gokila Nivetha5
1N. Valarmathi, Assistant Professor, Department of IT, M. Kumarasamy College of Engineering, Karur (Tamil Nadu), India.
2V. Kavitha, Assistant Professor, Department of CSE, Cheran College of Engineering, Karur (Tamil Nadu), India.
3K. C. Mohanraj, Assistant Professor, Department of CSE, Cheran College of Engineering, Karur (Tamil Nadu), India.
4S. Revathy, Assistant Professor, Department of CSE, Cheran College of Engineering, Karur (Tamil Nadu), India.
5E. Gokila Nivetha, Assistant Professor, Department of CSE, Cheran College of Engineering, Karur (Tamil Nadu), India.
Manuscript received on 24 March 2019 | Revised Manuscript received on 05 April 2019 | Manuscript Published on 18 April 2019 | PP: 613-615 | Volume-7 Issue-6S March 2019 | Retrieval Number: F03200376S19/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Information handling the investigation ventures of the “Learning Discovery in Databases” process, a field at the crossing point of registering and insights is that the technique that attempts to get designs in enormous data sets. It uses techniques at the crossing point of figuring, machine learning, insights, and information frameworks. Ongoing net applications, that have focused on police examination the extremity of the content, our content classifier enables clients to recognize positive and negative surveys so helping the client with supposition mining .Many sites that allow clients to look for and post audits of bought mobile applications, which closes in dynamic aggregation of heaps of audits written in tongue. The clients are given an impediment of utilizing the applications. The client can download the applications by giving the mystery key which is given by the administrator. What’s more, when the clients are endeavoring to abuse the applications by downloading it various occasions, the client data is send to the Admin. We are additionally foreseeing what numbers of clients are utilizing the specific App.
Keywords: Android, IOS, Symbian, ISODATA, Naive Bayes, Common Substring Removals Problem (CSR).
Scope of the Article: Search-Based Software Engineering