{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T13:05:51Z","timestamp":1755695151062,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030963071"},{"type":"electronic","value":"9783030963088"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96308-8_120","type":"book-chapter","created":{"date-parts":[[2022,3,26]],"date-time":"2022-03-26T13:15:41Z","timestamp":1648300541000},"page":"1292-1305","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Image-based Android Malware Detection Models using Static and\u00a0Dynamic Features"],"prefix":"10.1007","author":[{"given":"Hemant","family":"Rathore","sequence":"first","affiliation":[]},{"given":"B. Raja","family":"Narasimhan","sequence":"additional","affiliation":[]},{"given":"Sanjay K.","family":"Sahay","sequence":"additional","affiliation":[]},{"given":"Mohit","family":"Sewak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,27]]},"reference":[{"key":"120_CR1","unstructured":"Cuckoo Sandbox - Automated Malware Analysis (2021). https:\/\/cuckoosandbox.org\/. Accessed Oct 2021"},{"key":"120_CR2","unstructured":"CUDA Zone (2021). https:\/\/developer.nvidia.com\/cuda-zone. Accessed Oct 2021"},{"key":"120_CR3","unstructured":"Google Colaboratory (2021). https:\/\/colab.research.google.com\/. Accessed Oct 2021"},{"key":"120_CR4","unstructured":"Google Play Store (2021). https:\/\/play.google.com\/storeAccessed Oct 2021"},{"key":"120_CR5","unstructured":"Total amount of malware and PUA under Android (2021). https:\/\/portal.av-atlas.org\/malware\/statistics. Accessed Oct 2021"},{"key":"120_CR6","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K.: DREBIN: effective and explainable detection of android malware in your pocket. In: Network and Distributed System Security (NDSS) Symposium, vol.\u00a014, pp. 23\u201326 (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"120_CR7","doi-asserted-by":"crossref","unstructured":"Ganesh, M., Pednekar, P., Prabhuswamy, P., Nair, D.S., Park, Y., Jeon, H.: CNN-based android malware detection. In: 2017 International Conference on Software Security and Assurance (ICSSA), pp. 60\u201365. IEEE (2017)","DOI":"10.1109\/ICSSA.2017.18"},{"key":"120_CR8","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"120_CR9","doi-asserted-by":"crossref","unstructured":"McLaughlin, N., et\u00a0al.: Deep android malware detection. In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, pp. 301\u2013308 (2017)","DOI":"10.1145\/3029806.3029823"},{"key":"120_CR10","doi-asserted-by":"crossref","unstructured":"Nataraj, L., Karthikeyan, S., Jacob, G., Manjunath, B.S.: Malware images: visualization and automatic classification. In: Proceedings of the 8th International Symposium on Visualization for Cyber Security, pp.\u00a01\u20137 (2011)","DOI":"10.1145\/2016904.2016908"},{"key":"120_CR11","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-030-68737-3_3","volume-title":"Broadband Communications, Networks, and Systems","author":"H Rathore","year":"2021","unstructured":"Rathore, H., Sahay, S.K., Rajvanshi, R., Sewak, M.: Identification of significant permissions for efficient android malware detection. In: Gao, H., J. Dur\u00e1n Barroso, R., Shanchen, P., Li, R. (eds.) BROADNETS 2020. LNICST, vol. 355, pp. 33\u201352. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-68737-3_3"},{"key":"120_CR12","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-030-68737-3_7","volume-title":"Broadband Communications, Networks, and Systems","author":"H Rathore","year":"2021","unstructured":"Rathore, H., Sahay, S.K., Thukral, S., Sewak, M.: Detection of malicious android applications: classical machine learning vs. deep neural network integrated with clustering. In: Gao, H., J. Dur\u00e1n Barroso, R., Shanchen, P., Li, R. (eds.) BROADNETS 2020. LNICST, vol. 355, pp. 109\u2013128. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-68737-3_7"},{"key":"120_CR13","doi-asserted-by":"crossref","unstructured":"Rezende, E., Ruppert, G., Carvalho, T., Ramos, F., De\u00a0Geus, P.: Malicious software classification using transfer learning of resnet-50 deep neural network. In: 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 1011\u20131014. IEEE (2017)","DOI":"10.1109\/ICMLA.2017.00-19"},{"key":"120_CR14","doi-asserted-by":"crossref","unstructured":"Sandler, M., Howard, A., Zhu, M., Zhmoginov, A., Chen, L.C.: MobileNetv2: inverted residuals and linear bottlenecks. In: 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4510\u20134520. IEEE (2018)","DOI":"10.1109\/CVPR.2018.00474"},{"key":"120_CR15","doi-asserted-by":"crossref","unstructured":"Sewak, M., Sahay, S.K., Rathore, H.: Deepintent: implicitintent based android IDS with E2E deep learning architecture. In: 2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications, pp.\u00a01\u20136. IEEE (2020)","DOI":"10.1109\/PIMRC48278.2020.9217188"},{"key":"120_CR16","doi-asserted-by":"crossref","unstructured":"Sewak, M., Sahay, S.K., Rathore, H.: DOOM: a novel adversarial-DRL-based op-code level metamorphic malware obfuscator for the enhancement of IDS. In: Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers, pp. 131\u2013134 (2020)","DOI":"10.1145\/3410530.3414411"},{"key":"120_CR17","doi-asserted-by":"crossref","unstructured":"Singh, A., Handa, A., Kumar, N., Shukla, S.K.: Malware analysis using image classification techniques. In: Cyber Security in India: Education, Research and Training, vol. 4, p. 33 (2020)","DOI":"10.1007\/978-981-15-1675-7_4"},{"key":"120_CR18","unstructured":"Sun, G., Qian, Q.: Deep learning and visualization for identifying malware families. IEEE Trans. Dependable Secure Comput. (2018)"},{"key":"120_CR19","doi-asserted-by":"crossref","unstructured":"Xiao, X.: An image-inspired and CNN-based android malware detection approach. In: 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 1259\u20131261. IEEE (2019)","DOI":"10.1109\/ASE.2019.00155"},{"key":"120_CR20","unstructured":"Yang, M., Wen, Q.: Detecting android malware by applying classification techniques on images patterns. In: 2017 IEEE 2nd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), pp. 344\u2013347. IEEE (2017)"},{"key":"120_CR21","doi-asserted-by":"publisher","first-page":"69246","DOI":"10.1109\/ACCESS.2019.2919796","volume":"7","author":"H Zhang","year":"2019","unstructured":"Zhang, H., Luo, S., Zhang, Y., Pan, L.: An efficient android malware detection system based on method-level behavioral semantic analysis. IEEE Access 7, 69246\u201369256 (2019)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Systems Design and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96308-8_120","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,26]],"date-time":"2022-03-26T13:29:53Z","timestamp":1648301393000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96308-8_120"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030963071","9783030963088"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96308-8_120","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"27 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems Design and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isda2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/isda21\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}