{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T21:14:53Z","timestamp":1762377293302,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031236891"},{"type":"electronic","value":"9783031236907"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-23690-7_4","type":"book-chapter","created":{"date-parts":[[2022,12,10]],"date-time":"2022-12-10T05:02:50Z","timestamp":1670648570000},"page":"64-83","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["SHIELD: A Multimodal Deep Learning Framework for Android Malware Detection"],"prefix":"10.1007","author":[{"given":"Narendra","family":"Singh","sequence":"first","affiliation":[]},{"given":"Somanath","family":"Tripathy","sequence":"additional","affiliation":[]},{"given":"Bruhadeshwar","family":"Bezawada","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,11]]},"reference":[{"key":"4_CR1","unstructured":"Palo alto networks, wildfire malware analysis service. https:\/\/docs.paloaltonetworks.com\/wildfire.html"},{"key":"4_CR2","unstructured":"Stephanie cuthbertson - director, android - google google i\/0 2019 keynote speech. https:\/\/www.youtube.com\/watch?v=lyRPyRKHO8M"},{"key":"4_CR3","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1016\/j.future.2020.02.002","volume":"107","author":"M Alazab","year":"2020","unstructured":"Alazab, M., Alazab, M., Shalaginov, A., Mesleh, A., Awajan, A.: Intelligent mobile malware detection using permission requests and API calls. Future Gener. Comput. Syst. 107, 509\u2013521 (2020)","journal-title":"Future Gener. Comput. Syst."},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Allix, K., Bissyand\u00e9, T.F., Klein, J., Le Traon, Y.: AndroZoo: collecting millions of android apps for the research community. In: 2016 IEEE\/ACM 13th Working Conference on Mining Software Repositories (MSR), pp. 468\u2013471. IEEE (2016)","DOI":"10.1145\/2901739.2903508"},{"key":"4_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101663","volume":"89","author":"MK Alzaylaee","year":"2020","unstructured":"Alzaylaee, M.K., Yerima, S.Y., Sezer, S.: DL-droid: deep learning based android malware detection using real devices. Comput. Secur. 89, 101663 (2020)","journal-title":"Comput. Secur."},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Arefkhani, M., Soryani, M.: Malware clustering using image processing hashes. In: 2015 9th Iranian Conference on Machine Vision and Image Processing (MVIP), pp. 214\u2013218. IEEE (2015)","DOI":"10.1109\/IranianMVIP.2015.7397539"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., Siemens, C.: DREBIN: effective and explainable detection of android malware in your pocket. In: Ndss, vol. 14, pp. 23\u201326 (2014)","DOI":"10.14722\/ndss.2014.23247"},{"issue":"1","key":"4_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-014-0242-0","volume":"14","author":"KS Han","year":"2015","unstructured":"Han, K.S., Lim, J.H., Kang, B., Im, E.G.: Malware analysis using visualized images and entropy graphs. Int. J. Inf. Secur. 14(1), 1\u201314 (2015)","journal-title":"Int. J. Inf. Secur."},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Jang, J.w., Kang, H., Woo, J., Mohaisen, A., Kim, H.K.: Andro-autopsy: anti-malware system based on similarity matching of malware and malware creator-centric information. Digit. Investig. 14, 17\u201335 (2015)","DOI":"10.1016\/j.diin.2015.06.002"},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"S48","DOI":"10.1016\/j.diin.2018.01.007","volume":"24","author":"EB Karbab","year":"2018","unstructured":"Karbab, E.B., Debbabi, M., Derhab, A., Mouheb, D.: MalDozer: automatic framework for android malware detection using deep learning. Digit. Investig. 24, S48\u2013S59 (2018)","journal-title":"Digit. Investig."},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Kelkar, S., Kraus, T., Morgan, D., Zhang, J., Dai, R.: Analyzing http-based information exfiltration of malicious android applications. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE), pp. 1642\u20131645. IEEE (2018)","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00242"},{"issue":"3","key":"4_CR12","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1109\/TIFS.2018.2866319","volume":"14","author":"T Kim","year":"2018","unstructured":"Kim, T., Kang, B., Rho, M., Sezer, S., Im, E.G.: A multimodal deep learning method for android malware detection using various features. IEEE Trans. Inf. Forensics Secur. 14(3), 773\u2013788 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Kouliaridis, V., Barmpatsalou, K., Kambourakis, G., Wang, G.: Mal-warehouse: a data collection-as-a-service of mobile malware behavioral patterns. In: 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI), pp. 1503\u20131508. IEEE (2018)","DOI":"10.1109\/SmartWorld.2018.00260"},{"key":"4_CR14","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems 25 (2012)"},{"key":"4_CR15","series-title":"Advanced Sciences and Technologies for Security Applications","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-030-13057-2_9","volume-title":"Deep Learning Applications for Cyber Security","author":"WY Lee","year":"2019","unstructured":"Lee, W.Y., Saxe, J., Harang, R.: SeqDroid: obfuscated android malware detection using stacked convolutional and recurrent neural networks. In: Alazab, M., Tang, M.J. (eds.) Deep Learning Applications for Cyber Security. ASTSA, pp. 197\u2013210. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-13057-2_9"},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1016\/j.compeleceng.2017.02.013","volume":"61","author":"N Milosevic","year":"2017","unstructured":"Milosevic, N., Dehghantanha, A., Choo, K.K.R.: Machine learning aided android malware classification. Comput. Electr. Eng. 61, 266\u2013274 (2017)","journal-title":"Comput. Electr. Eng."},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Nataraj, L., Karthikeyan, S., Jacob, G., Manjunath, B.S.: Malware images: visualization and automatic classification. In: Proceedings of the 8th International Symposium on Visualization for Cyber Security, pp. 1\u20137 (2011)","DOI":"10.1145\/2016904.2016908"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Oak, R., Du, M., Yan, D., Takawale, H., Amit, I.: Malware detection on highly imbalanced data through sequence modeling. In: Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, pp. 37\u201348 (2019)","DOI":"10.1145\/3338501.3357374"},{"key":"4_CR19","unstructured":"Serban, I.V., Ororbia II, A.G., Pineau, J., Courville, A.: Multi-modal variational encoder-decoders (2016)"},{"key":"4_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2014.02.009","volume":"43","author":"A Shabtai","year":"2014","unstructured":"Shabtai, A., Tenenboim-Chekina, L., Mimran, D., Rokach, L., Shapira, B., Elovici, Y.: Mobile malware detection through analysis of deviations in application network behavior. Comput. Secur. 43, 1\u201318 (2014)","journal-title":"Comput. Secur."},{"issue":"3","key":"4_CR21","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1109\/TBDATA.2017.2723570","volume":"5","author":"M Tang","year":"2017","unstructured":"Tang, M., Alazab, M., Luo, Y.: Big data for cybersecurity: vulnerability disclosure trends and dependencies. IEEE Trans. Big Data 5(3), 317\u2013329 (2017)","journal-title":"IEEE Trans. Big Data"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Venkatraman, S., Alazab, M.: Use of data visualisation for zero-day malware detection. Secur. Commun. Netw. 2018 (2018)","DOI":"10.1155\/2018\/1728303"},{"key":"4_CR23","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.jnca.2018.12.014","volume":"133","author":"S Wang","year":"2019","unstructured":"Wang, S., Chen, Z., Yan, Q., Yang, B., Peng, L., Jia, Z.: A mobile malware detection method using behavior features in network traffic. J. Netw. Comput. Appl. 133, 15\u201325 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"4_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-3-319-60876-1_12","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"F Wei","year":"2017","unstructured":"Wei, F., Li, Y., Roy, S., Ou, X., Zhou, W.: Deep ground truth analysis of current android malware. In: Polychronakis, M., Meier, M. (eds.) DIMVA 2017. LNCS, vol. 10327, pp. 252\u2013276. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-60876-1_12"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Xu, K., Li, Y., Deng, R.H., Chen, K.: DeepRefiner: Multi-layer android malware detection system applying deep neural networks. In: 2018 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 473\u2013487. IEEE (2018)","DOI":"10.1109\/EuroSP.2018.00040"},{"issue":"1","key":"4_CR26","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/TST.2016.7399288","volume":"21","author":"Z Yuan","year":"2016","unstructured":"Yuan, Z., Lu, Y., Xue, Y.: Droiddetector: android malware characterization and detection using deep learning. Tsinghua Sci. Technol. 21(1), 114\u2013123 (2016)","journal-title":"Tsinghua Sci. Technol."}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-23690-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,10]],"date-time":"2022-12-10T05:03:45Z","timestamp":1670648625000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-23690-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031236891","9783031236907"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-23690-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"11 December 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tirupati","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icissconf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"55","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}