Table of Contents - X.1130 (12/2025) - Technical guidelines for detecting malicious activities of mobile applications

1	Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview
7 Characteristics and risks of malicious APPs
7.1 Characteristics of malicious APPs
7.2 Risks of malicious APPs
8 Technical framework for detection of malicious activities of malicious APPs
8.1 Reference architecture
8.2 Detection components
8.3 Workflows
9 Technical capabilities for detection of malicious activities of malicious APPs
9.1 Feature extraction and detection capability
9.2 Interaction capability
9.3 Secure environment capability
Bibliography