Acknowledgement
We want to express our appreciation to the Universiti Teknologi Mara Cawangan Terengganu Kampus Kuala Terengganu for their constant support in getting the authors to publish this work.
References
- Alshamkhany, M., Alshamkhany, W., Mansour, M., Khan, M., Dhou, S., & Aloul, F. (2020, November 17). Botnet Attack Detection using Machine Learning. https://doi.org/10.1109/iit50501.2020.9299061
- Ambore, S., Richardson, C A., Dogan, H., Apeh, E., & Osselton, D. (2017, October 1). A resilient cybersecurity framework for Mobile Financial Services (MFS). Taylor & Francis, 1(3-4), 202-224. https://doi.org/10.1080/23742917.2017.1386483
- Android Mobile Security Threats. (2023, November 8). Www.kaspersky.com. https://www.kaspersky.com/resourcecenter/threats/mobile
- Baker, K. (2021, January 14). 11 Types of Malware + Examples That You Should Know. Crowdstrike.com. https://www.crowdstrike.com/cybersecurity101/malware/types-of-malware/
- Cybleinc. (2021, December 1). Banking Trojan Targets Banking Users in Malaysia. Cyble. https://cyble.com/blog/banking-trojan-targets-bankingusers-in-malaysia/
- Datta, P., Tanwar, S., Panda, S N., & Rana, A. (2020, June 1). Security and Issues of M-Banking: A Technical Report.
- Dr.Web - Doctor Web's Q3 2024 review of virus activity on mobile devices. (2024). Dr.Web. https://news.drweb.com/show/review/?lng=en&i=14912
- Ferdous, J., Islam, R., Mahboubi, A., & Islam, Md. Z. (2023). A review of state-of-the-art malware attack trends and Defense Mechanisms. IEEE Access, 11, 121118-121141. https://doi.org/10.1109/access.2023.3328351
- Gharibi, W., & Mirza, A A. (2011, January 1). Software Vulnerabilities, Banking Threats, Botnets and Malware Self-Protection Technologies. Cornell University. https://doi.org/10.48550/arxiv.1105.1720
- Gholamy, A. (2018). Why 70/30 or 80/20 Relation Between Training and Testing Sets: A Pedagogical Explanation (V. Kreinovich & O. Kosheleva, Eds.) [Review of Why 70/30 or 80/20 Relation Between Training and Testing Sets: A Pedagogical Explanation]. https://scholarworks.utep.edu/cs_techrep/1209/
- Ioannis Gasparis, Qian, Z., Song, C., & Krishnamurthy, S. V. (2017). Detecting Android Root Exploits by Learning from Root Providers. USENIX Security Symposium, 1129-1144.
- Muhammad, Z., Anwar, Z., Javed, A. R., Saleem, B., Abbas, S., & Gadekallu, T. R. (2023). Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses. Technologies, 11(3), 76. https://doi.org/10.3390/technologies11030076
- Nguyen, T.-H., & Yoo, M. (2017). A behavior-based mobile malware detection model in software-defined networking. https://doi.org/10.1109/icisct.2017.8188590
- Qamar, A., Karim, A., & Chang, V. (2019). Mobile malware attacks: Review, taxonomy & future directions. Future Generation Computer Systems, 97, 887-909. https://doi.org/10.1016/j.future.2019.03.007
- Rathod, H., & Sanjay Agal. (2023). A Study and Overview on Current Trends and Technology in Mobile Applications and Its Development. Lecture Notes in Networks and Systems, 383-395. https://doi.org/10.1007/978-981-99-4932-8_35
- Susanti, A R., Djatna, T., & Kusuma, W A. (2017, September 1). Twitter's Sentiment Analysis on Gsm Services using Multinomial Naive Bayes. Ahmad Dahlan University, 15(3), 1354-1354. https://doi.org/10.12928/telkomnika.v15i3.4284