{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T05:25:56Z","timestamp":1733981156928,"version":"3.30.2"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"21-22","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1007\/s00500-024-10346-5","type":"journal-article","created":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T13:55:44Z","timestamp":1732542944000},"page":"12917-12928","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A recurrent neural network architecture for android mobile data analysis for detecting malware infected data"],"prefix":"10.1007","volume":"28","author":[{"given":"Prabhu","family":"Murugan","sequence":"first","affiliation":[]},{"given":"A.","family":"Manimaran","sequence":"additional","affiliation":[]},{"given":"Ramesh","family":"Sundar","sequence":"additional","affiliation":[]},{"given":"Prabakar","family":"Dakshinamoorthy","sequence":"additional","affiliation":[]},{"given":"Gnanajeyaraman","family":"Rajaram","sequence":"additional","affiliation":[]},{"given":"Shruti","family":"Garg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,25]]},"reference":[{"key":"10346_CR1","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1016\/j.procs.2021.03.105","volume":"184","author":"M Almahmoud","year":"2021","unstructured":"Almahmoud M, Alzubi D, Yaseen Q (2021) ReDroidDet: android malware detection based on recurrent neural network. Procedia Comput Sci 184:841\u2013846","journal-title":"Procedia Comput Sci"},{"key":"10346_CR2","doi-asserted-by":"crossref","unstructured":"Baskar A, Rajaram A (2023) Deep optimization algorithm for emergency-aware data transmission in Mobile-Ad Hoc Networks. J Intell Fuzzy Syst (Preprint), 1\u201319","DOI":"10.3233\/JIFS-233425"},{"key":"10346_CR15","unstructured":"Carl S, Octavian S, Tudor D (2015) Vulnerability disclosure in the age of social media: exploiting twitter for predicting real-world exploits. In: Proceedings of the 24th USENIX Security Symposium, 1041\u20131056"},{"key":"10346_CR3","doi-asserted-by":"crossref","unstructured":"Chen S, Xue M, Tang Z, Xu L, Zhu H (2016) Stormdroid: a streaminglized machine learning-based system for detecting Android malware. In: Proceedings of the 11th ACM on Asia conference on computer and communications security, pp 377\u2013388","DOI":"10.1145\/2897845.2897860"},{"key":"10346_CR4","doi-asserted-by":"crossref","unstructured":"Chen YC, Li YJ, Tseng A, Lin T (2017) Deep learning for malicious flow detection. In: 2017 IEEE 28th annual international symposium on personal, indoor, and mobile radio communications (PIMRC). IEEE, pp 1\u20137","DOI":"10.1109\/PIMRC.2017.8292316"},{"key":"10346_CR5","doi-asserted-by":"crossref","unstructured":"Chen S, Su T, Fan L, Meng G, Xue M, Liu Y, Xu L (2018) Are mobile banking apps secure? what can be improved?. In: Proceedings of the 2018 26th ACM joint meeting on European software engineering conference and symposium on the foundations of software engineering, 797\u2013802","DOI":"10.1145\/3236024.3275523"},{"issue":"5","key":"10346_CR6","first-page":"2113","volume":"23","author":"P Chiranjeevi","year":"2022","unstructured":"Chiranjeevi P, Rajaram A (2022) Twitter sentiment analysis for environmental weather conditions in recommendation of tourism. J Environ Prot Ecol 23(5):2113\u20132123","journal-title":"J Environ Prot Ecol"},{"key":"10346_CR60","doi-asserted-by":"crossref","unstructured":"Cho K (2014) Learning phrase representations using RNN encoder-decoder for statistical machine translation. arXiv preprint arXiv:1406.1078","DOI":"10.3115\/v1\/D14-1179"},{"issue":"2021","key":"10346_CR7","first-page":"847","volume":"184","author":"ON Elayan","year":"2021","unstructured":"Elayan ON, Mustafa AM (2021) Android mobile malware detection using deep learning algorithm. Elsevier 184(2021):847\u2013852","journal-title":"Elsevier"},{"key":"10346_CR8","doi-asserted-by":"crossref","unstructured":"Hsien-De Huang T, Kao HY (2018) R2-d2: color-inspired convolutional neural network (cnn)-based android malware detections. In: 2018 IEEE international conference on big data (Big Data). IEEE, pp 2633\u20132642","DOI":"10.1109\/BigData.2018.8622324"},{"issue":"6","key":"10346_CR9","doi-asserted-by":"publisher","first-page":"479174","DOI":"10.1155\/2015\/479174","volume":"11","author":"H Kang","year":"2015","unstructured":"Kang H, Jang JW, Mohaisen A, Kim HK (2015) Detecting and classifying android malware using static analysis along with creator information. Int J Distrib Sens Netw 11(6):479174","journal-title":"Int J Distrib Sens Netw"},{"key":"10346_CR10","doi-asserted-by":"crossref","unstructured":"Kaushik P, Yadav PK (2018) A novel approach for detecting malware in android applications using deep learning. In: 2018 eleventh international conference on contemporary computing (IC3). IEEE, pp 1\u20134","DOI":"10.1109\/IC3.2018.8530668"},{"key":"10346_CR11","unstructured":"Dongfang L, Yibo X, Zhaoguo W (2018) DeepDetector: android malware detection using deep neural network. In: International conference on advances in computing and communication engineering, France 22\u201323 June 2018"},{"issue":"3","key":"10346_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10586-017-0944-y","volume":"21","author":"N Mohammad","year":"2018","unstructured":"Mohammad N, Tamleek AT, Sohail K, Imam A, Toqeer AS (2018) Deep neural architectures for large scale android malware analysis. Cluster Comput 21(3):1\u201320. https:\/\/doi.org\/10.1007\/s10586-017-0944-y","journal-title":"Cluster Comput"},{"key":"10346_CR13","doi-asserted-by":"crossref","unstructured":"Odusami M, Abayomi-Alli O, Misra S, Shobayo O, Damasevicius R, Maskeliunas R (2018) Android malware detection: a survey. In: International conference on applied informatics. Springer, Cham, pp 255\u2013266","DOI":"10.1007\/978-3-030-01535-0_19"},{"key":"10346_CR14","doi-asserted-by":"publisher","first-page":"100955","DOI":"10.1016\/j.measen.2023.100955","volume":"32","author":"S Poornima","year":"2024","unstructured":"Poornima S, Mahalakshmi R (2024) Automated malware detection using machine learning and deep learning approaches for android applications. Meas Sens 32:100955","journal-title":"Meas Sens"},{"issue":"1","key":"10346_CR16","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s10844-010-0148-x","volume":"38","author":"A Shabtai","year":"2012","unstructured":"Shabtai A, Kanonov U, Elovici Y, Glezer C, Weiss Y (2012) Andromaly: a behavioral malware detection framework for android devices. J Intell Inf Syst 38(1):161\u2013190","journal-title":"J Intell Inf Syst"},{"key":"10346_CR17","doi-asserted-by":"crossref","unstructured":"Su X, Zhang D, Li W, Zhao K (2016) A deep learning approach to Android malware feature learning and detection. In: 2016 IEEE Trustcom\/BigDataSE\/ISPA. IEEE, pp 244\u2013251","DOI":"10.1109\/TrustCom.2016.0070"},{"key":"10346_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.diin.2015.01.001","volume":"13","author":"KA Talha","year":"2015","unstructured":"Talha KA, Alper DI, Aydin C (2015) APK auditor: permission-based android malware detection system. Digit Investig 13:1\u201314","journal-title":"Digit Investig"},{"key":"10346_CR19","doi-asserted-by":"crossref","unstructured":"Tobiyama S, Yamaguchi Y, Shimada H, Ikuse T, Yagi T (2016) Malware detection with deep neural network using process behavior. In: 2016 IEEE 40th annual computer software and applications conference (COMPSAC), vol 2. IEEE, pp 577\u2013582","DOI":"10.1109\/COMPSAC.2016.151"},{"issue":"10","key":"10346_CR77","doi-asserted-by":"publisher","first-page":"249","DOI":"10.3390\/electronics7100249","volume":"7","author":"Y Wadhawan","year":"2018","unstructured":"Wadhawan Y, AlMajali A, Neuman C (2018) A comprehensive analysis of smart grid systems against cyber-physical attacks.\u00a0Electronics\u00a07(10):249","journal-title":"Electronics"},{"key":"10346_CR20","doi-asserted-by":"publisher","first-page":"25591","DOI":"10.1109\/ACCESS.2017.2771470","volume":"5","author":"L Wei","year":"2017","unstructured":"Wei L, Luo W, Weng J, Zhong Y, Zhang X, Yan Z (2017) Machine learning-based malicious application detection of android. IEEE Access 5:25591\u201325601","journal-title":"IEEE Access"},{"issue":"8","key":"10346_CR21","doi-asserted-by":"publisher","first-page":"5583","DOI":"10.1109\/TII.2020.3021689","volume":"17","author":"M Wo\u017aniak","year":"2020","unstructured":"Wo\u017aniak M, Si\u0142ka J, Wieczorek M, Alrashoud M (2020) Recurrent neural network model for IoT and networking malware threat detection. IEEE Trans Industr Inf 17(8):5583\u20135594","journal-title":"IEEE Trans Industr Inf"},{"key":"10346_CR22","doi-asserted-by":"publisher","first-page":"2190","DOI":"10.1109\/CompComm.2018.8781037","volume-title":"2018 IEEE 4th international conference on computer and communications (ICCC)","author":"J Zhang","year":"2018","unstructured":"Zhang J, Zou F, Zhu J (2018) Android malware detection based on deep learning. In: 2018 IEEE 4th international conference on computer and communications (ICCC). IEEE, pp 2190\u20132194"},{"key":"10346_CR23","doi-asserted-by":"publisher","unstructured":"Jianming Z, Futai Z, Junru Z (2018) Android malware detection based on deep learning. In: IEEE 4th international conference on computer and communications, Chengdu, China, 2190\u20132194. https:\/\/doi.org\/10.1109\/CompComm.2018.87810","DOI":"10.1109\/CompComm.2018.87810"},{"key":"10346_CR24","doi-asserted-by":"crossref","unstructured":"Zhao Z, Li Z, Yu J, Zhang F, Xie X, Xu H, Chen B (2023) CMD: co-analyzed IoT malware detection and forensics via network and hardware domains.\u00a0IEEE Trans Mobile Comput","DOI":"10.1109\/TMC.2023.3311012"},{"issue":"6","key":"10346_CR25","first-page":"1650","volume":"37","author":"S Zhida","year":"2017","unstructured":"Zhida S, Yuefei Z, Long L (2017) Android malware application detection using deep learning. J Comput Appl 37(6):1650","journal-title":"J Comput Appl"},{"key":"10346_CR26","doi-asserted-by":"crossref","unstructured":"Ziyun Z, Tudor D (2016) Featuresmith: automatically engineering features for malware detection by mining the security literature. In: Proceedings of the 23rd ACM SIGSAC conference on computer and communications security, 767\u2013778","DOI":"10.1145\/2976749.2978304"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-024-10346-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-024-10346-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-024-10346-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T07:36:09Z","timestamp":1733902569000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-024-10346-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":28,"journal-issue":{"issue":"21-22","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["10346"],"URL":"https:\/\/doi.org\/10.1007\/s00500-024-10346-5","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2024,11]]},"assertion":[{"value":"11 June 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 November 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Conflict of Interest is not applicable in this work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"No participation of humans takes place in this implementation process.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"No violation of Human and Animal Rights is involved.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights"}}]}}