A Novel Approach for clone app detection using VADER’s Algorithm
Software that imitates the capabilities of legitimate, legally responsible, and authentic applications is known as a fraudulent web application. It’s critical to keep track of which mobile applications are secure and which aren’t as the number of them in our daily lives increases. One cannot judge t...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
EDP Sciences
2023-01-01
|
Series: | ITM Web of Conferences |
Subjects: | |
Online Access: | https://www.itm-conferences.org/articles/itmconf/pdf/2023/06/itmconf_icdsac2023_01003.pdf |
_version_ | 1797745602515173376 |
---|---|
author | Antad Sonali Khamkar Shreyas Khambayate Ayush Khandare Om Khaire Atharva Khambadkar Prasad Khanchandni Deep |
author_facet | Antad Sonali Khamkar Shreyas Khambayate Ayush Khandare Om Khaire Atharva Khambadkar Prasad Khanchandni Deep |
author_sort | Antad Sonali |
collection | DOAJ |
description | Software that imitates the capabilities of legitimate, legally responsible, and authentic applications is known as a fraudulent web application. It’s critical to keep track of which mobile applications are secure and which aren’t as the number of them in our daily lives increases. One cannot judge the truth, and the only basis for judging each application is the opposing viewpoints that are stated for each application. Once the false program has been installed, the perpetrators carry out retaliatory acts such as aggressive ad display to recoup revenue, intercepting sensitive data from your system, polluting the impact device, and so forth. Users frequently cannot tell the difference between legitimate and fraudulent applications By developing a place where people can ask questions before installing the program, It is suggested to employ sentiment analysis (VADERS), which is a revolutionary method for detecting fraudulent apps.. The outcome is determined by the ratings and comments provided by users who have already used the application. As a result, we will use sentiment analysis to examine the viewpoints once more. Sentiment analysis will be carried out using the VADERS approach, which analyses text. |
first_indexed | 2024-03-12T15:25:42Z |
format | Article |
id | doaj.art-57ca2a13eec7413b90bf05e467340f01 |
institution | Directory Open Access Journal |
issn | 2271-2097 |
language | English |
last_indexed | 2024-03-12T15:25:42Z |
publishDate | 2023-01-01 |
publisher | EDP Sciences |
record_format | Article |
series | ITM Web of Conferences |
spelling | doaj.art-57ca2a13eec7413b90bf05e467340f012023-08-10T13:16:50ZengEDP SciencesITM Web of Conferences2271-20972023-01-01560100310.1051/itmconf/20235601003itmconf_icdsac2023_01003A Novel Approach for clone app detection using VADER’s AlgorithmAntad Sonali0Khamkar Shreyas1Khambayate Ayush2Khandare Om3Khaire Atharva4Khambadkar Prasad5Khanchandni Deep6Department of Engineering, Sciences, and Humanities (DESH) Vishwakarma Institute of TechnologyDepartment of Engineering, Sciences, and Humanities (DESH) Vishwakarma Institute of TechnologyDepartment of Engineering, Sciences, and Humanities (DESH) Vishwakarma Institute of TechnologyDepartment of Engineering, Sciences, and Humanities (DESH) Vishwakarma Institute of TechnologyDepartment of Engineering, Sciences, and Humanities (DESH) Vishwakarma Institute of TechnologyDepartment of Engineering, Sciences, and Humanities (DESH) Vishwakarma Institute of TechnologyDepartment of Engineering, Sciences, and Humanities (DESH) Vishwakarma Institute of TechnologySoftware that imitates the capabilities of legitimate, legally responsible, and authentic applications is known as a fraudulent web application. It’s critical to keep track of which mobile applications are secure and which aren’t as the number of them in our daily lives increases. One cannot judge the truth, and the only basis for judging each application is the opposing viewpoints that are stated for each application. Once the false program has been installed, the perpetrators carry out retaliatory acts such as aggressive ad display to recoup revenue, intercepting sensitive data from your system, polluting the impact device, and so forth. Users frequently cannot tell the difference between legitimate and fraudulent applications By developing a place where people can ask questions before installing the program, It is suggested to employ sentiment analysis (VADERS), which is a revolutionary method for detecting fraudulent apps.. The outcome is determined by the ratings and comments provided by users who have already used the application. As a result, we will use sentiment analysis to examine the viewpoints once more. Sentiment analysis will be carried out using the VADERS approach, which analyses text.https://www.itm-conferences.org/articles/itmconf/pdf/2023/06/itmconf_icdsac2023_01003.pdfsentiment analysispositive – negative ratingsapp securitymachine learning modelsbehavioral feature extraction |
spellingShingle | Antad Sonali Khamkar Shreyas Khambayate Ayush Khandare Om Khaire Atharva Khambadkar Prasad Khanchandni Deep A Novel Approach for clone app detection using VADER’s Algorithm ITM Web of Conferences sentiment analysis positive – negative ratings app security machine learning models behavioral feature extraction |
title | A Novel Approach for clone app detection using VADER’s Algorithm |
title_full | A Novel Approach for clone app detection using VADER’s Algorithm |
title_fullStr | A Novel Approach for clone app detection using VADER’s Algorithm |
title_full_unstemmed | A Novel Approach for clone app detection using VADER’s Algorithm |
title_short | A Novel Approach for clone app detection using VADER’s Algorithm |
title_sort | novel approach for clone app detection using vader s algorithm |
topic | sentiment analysis positive – negative ratings app security machine learning models behavioral feature extraction |
url | https://www.itm-conferences.org/articles/itmconf/pdf/2023/06/itmconf_icdsac2023_01003.pdf |
work_keys_str_mv | AT antadsonali anovelapproachforcloneappdetectionusingvadersalgorithm AT khamkarshreyas anovelapproachforcloneappdetectionusingvadersalgorithm AT khambayateayush anovelapproachforcloneappdetectionusingvadersalgorithm AT khandareom anovelapproachforcloneappdetectionusingvadersalgorithm AT khaireatharva anovelapproachforcloneappdetectionusingvadersalgorithm AT khambadkarprasad anovelapproachforcloneappdetectionusingvadersalgorithm AT khanchandnideep anovelapproachforcloneappdetectionusingvadersalgorithm AT antadsonali novelapproachforcloneappdetectionusingvadersalgorithm AT khamkarshreyas novelapproachforcloneappdetectionusingvadersalgorithm AT khambayateayush novelapproachforcloneappdetectionusingvadersalgorithm AT khandareom novelapproachforcloneappdetectionusingvadersalgorithm AT khaireatharva novelapproachforcloneappdetectionusingvadersalgorithm AT khambadkarprasad novelapproachforcloneappdetectionusingvadersalgorithm AT khanchandnideep novelapproachforcloneappdetectionusingvadersalgorithm |