@article{Akpojaro_Aigbe_Onwudebelu_2014, title={Unsupervised Machine Learning Techniques for Detecting Malware Applications in Wireless Devices}, volume={2}, url={https://journals.scholarpublishing.org/index.php/TMLAI/article/view/206}, DOI={10.14738/tmlai.23.206}, abstractNote={<p>It is no doubt that we are in the era of ‘big data’, and different machines and tools are being developed every day to enable users to effectively access, manipulate and process data to provide timely information needed for decision making. The situation has led to increasingly use of wireless devices including smartphones, tablets, pacemakers, etc., with different platforms. As professionals including doctors, engineers, scientists, artists, etc., use these devices in accessing, process and disseminating information services are available, so also malware attackers are strategizing. Hence the last one decade has witnessed constant literatures in the design and development of both supervised and unsupervised machine learning algorithms to checkmate malware applications in wireless devices. In this paper, we study the properties of unsupervised learning algorithms; in particular, we quantify the performance of these algorithms under two scenarios; using data sets from unknown attackers and data sets from known attackers. Our findings show that the recently -algorithm appears superior to the other unsupervised algorithms investigated.    </p>}, number={3}, journal={Transactions on Engineering and Computing Sciences}, author={Akpojaro, Jackson and Aigbe, Princewill and Onwudebelu, Ugochukwu}, year={2014}, month={Jun.}, pages={20–29} }