{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T11:27:24Z","timestamp":1772364444451,"version":"3.50.1"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,6,21]],"date-time":"2023-06-21T00:00:00Z","timestamp":1687305600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,21]],"date-time":"2023-06-21T00:00:00Z","timestamp":1687305600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s10207-023-00712-z","type":"journal-article","created":{"date-parts":[[2023,6,21]],"date-time":"2023-06-21T14:02:16Z","timestamp":1687356136000},"page":"1687-1712","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Malware classification approaches utilizing binary and text encoding of permissions"],"prefix":"10.1007","volume":"22","author":[{"given":"Mo\u2019ath","family":"Zyout","sequence":"first","affiliation":[]},{"given":"Raed","family":"Shatnawi","sequence":"additional","affiliation":[]},{"given":"Hassan","family":"Najadat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,21]]},"reference":[{"key":"712_CR1","unstructured":"Smartphones: Statistics and Facts Statista. https:\/\/www.statista.com\/topics\/840\/smartphones\/ Accessed 25 Sep 2021"},{"key":"712_CR2","unstructured":"IDC: IDC\u2014Smartphone Market Share\u2013 Vendor (2018). https:\/\/www.idc.com\/promo\/smartphone-market-share\/vendor Accessed 11 May 2021"},{"issue":"April","key":"712_CR3","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.future.2020.03.052","volume":"110","author":"R Mateless","year":"2020","unstructured":"Mateless, R., Rejabek, D., Margalit, O., Moskovitch, R.: Decompiled APK based malicious code classification. Futur. Gener. Comput. Syst. 110(April), 135\u2013147 (2020). https:\/\/doi.org\/10.1016\/j.future.2020.03.052","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"6","key":"712_CR4","doi-asserted-by":"publisher","first-page":"3587","DOI":"10.1007\/s10664-019-09760-3","volume":"24","author":"K Khanmohammadi","year":"2019","unstructured":"Khanmohammadi, K., Ebrahimi, N., Hamou-Lhadj, A., Khoury, R.: Empirical study of android repackaged applications. Empir. Softw. Eng. 24(6), 3587\u20133629 (2019). https:\/\/doi.org\/10.1007\/s10664-019-09760-3","journal-title":"Empir. Softw. Eng."},{"issue":"3","key":"712_CR5","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/s11416-018-0328-8","volume":"15","author":"S Suresh","year":"2019","unstructured":"Suresh, S., Di Troia, F., Potika, K., Stamp, M.: An analysis of Android adware. J. Comput. Virol. Hacking Tech. 15(3), 147\u2013160 (2019). https:\/\/doi.org\/10.1007\/s11416-018-0328-8","journal-title":"J. Comput. Virol. Hacking Tech."},{"issue":"1","key":"712_CR6","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s10844-010-0148-x","volume":"38","author":"A Shabtai","year":"2012","unstructured":"Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: Andromaly: a behavioral malware detection framework for android devices. J. Intell. Inf. Syst. 38(1), 161\u2013190 (2012). https:\/\/doi.org\/10.1007\/s10844-010-0148-x","journal-title":"J. Intell. Inf. Syst."},{"key":"712_CR7","unstructured":"Top 7 Mobile Security Threats in 2020 | Kaspersky. https:\/\/www.kaspersky.com\/resource-center\/threats\/top-seven-mobile-security-threats-smart-phones-tablets-and-mobile-internet-devices-what-the-future-has-in-store Accessed 20 March 2021"},{"key":"712_CR8","unstructured":"Harshalatha, P., Mohanasundaram, R.: Classification of malware detection using machine learning algorithms: a survey. Int. J. Sci. Technol. Res. 9(02) (2020)"},{"key":"712_CR9","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-030-59000-0_10","volume":"1284 CCIS","author":"P Wyrwinski","year":"2020","unstructured":"Wyrwinski, P., Dutkiewicz, J., Jedrzejek, C.: Ensemble malware classification using neural networks. Commun. Comput. Inf. Sci. 1284 CCIS, 125\u2013138 (2020). https:\/\/doi.org\/10.1007\/978-3-030-59000-0_10","journal-title":"Commun. Comput. Inf. Sci."},{"key":"712_CR10","doi-asserted-by":"publisher","unstructured":"Jusoh, R., Firdaus, A., Anwar, S., Osman, M.Z., Darmawan, M.F., Razak, M.F.A.: Malware detection using static analysis in android: a review of FeCO (features, classification, and obfuscation). PeerJ Comput. Sci. 7(March 2018), 1\u201354 (2021). https:\/\/doi.org\/10.7717\/peerj-cs.522","DOI":"10.7717\/peerj-cs.522"},{"key":"712_CR11","doi-asserted-by":"publisher","unstructured":"Khariwal, K., Singh, J., Arora, A.: IPDroid Android malware detection using intents and permissions. Proc. World Conf. Smart Trends Syst. Secur. Sustain (2020). https:\/\/doi.org\/10.1109\/WorldS450073.2020.9210414","DOI":"10.1109\/WorldS450073.2020.9210414"},{"key":"712_CR12","doi-asserted-by":"crossref","unstructured":"Onwuzurike, L., Mariconti, E., Andriotis, P., De Cristofaro, E., Ross, G., Stringhini, G.: MaMaDroid: Detecting android malware by building markov chains of behavioral models (extended version). (2017) arXiv:1711.07477","DOI":"10.14722\/ndss.2017.23353"},{"key":"712_CR13","doi-asserted-by":"publisher","first-page":"181102","DOI":"10.1109\/access.2020.3028370","volume":"8","author":"Z Wang","year":"2020","unstructured":"Wang, Z., Liu, Q., Chi, Y.: Review of android malware detection based on deep learning. IEEE Access 8, 181102\u2013181126 (2020). https:\/\/doi.org\/10.1109\/access.2020.3028370","journal-title":"IEEE Access"},{"key":"712_CR14","doi-asserted-by":"publisher","unstructured":"Thuan, L.D., Van Huong, P., Van Hiep, H., Kim Khanh, N.: Improvement of feature set based on Apriori algorithm in Android malware classification using machine learning method. Proc. - 2020 RIVF Int. Conf. Comput. Commun. Technol, Proc (2020). https:\/\/doi.org\/10.1109\/RIVF48685.2020.9140779","DOI":"10.1109\/RIVF48685.2020.9140779"},{"key":"712_CR15","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1016\/j.future.2019.11.034","volume":"105","author":"R Taheri","year":"2020","unstructured":"Taheri, R., Ghahramani, M., Javidan, R., Shojafar, M., Pooranian, Z., Conti, M.: Similarity-based Android malware detection using Hamming distance of static binary features. Futur. Gener. Comput. Syst. 105, 230\u2013247 (2020). https:\/\/doi.org\/10.1016\/j.future.2019.11.034. arXiv:1908.05759","journal-title":"Futur. Gener. Comput. Syst."},{"key":"712_CR16","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2018.8585560","author":"AH Lashkari","year":"2018","unstructured":"Lashkari, A.H., Kadir, A.F.A., Taheri, L., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark android malware datasets and classification. Proc. Int. Carnahan Conf. Secur. Technol. (2018). https:\/\/doi.org\/10.1109\/CCST.2018.8585560","journal-title":"Proc. Int. Carnahan Conf. Secur. Technol."},{"key":"712_CR17","doi-asserted-by":"publisher","first-page":"844","DOI":"10.1016\/j.future.2020.10.008","volume":"115","author":"SI Imtiaz","year":"2021","unstructured":"Imtiaz, S.I., ur Rehman, S., Javed, A.R., Jalil, Z., Liu, X., Alnumay, W.S.: DeepAMD: detection and identification of Android malware using high-efficient deep artificial neural network. Fut. Gener. Comput. Syst. 115, 844\u2013856 (2021). https:\/\/doi.org\/10.1016\/j.future.2020.10.008","journal-title":"Fut. Gener. Comput. Syst."},{"issue":"24","key":"712_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s20247013","volume":"20","author":"J Singh","year":"2020","unstructured":"Singh, J., Thakur, D., Ali, F., Gera, T., Kwak, K.S.: Deep feature extraction and classification of android malware images. Sensors 20(24), 1\u201329 (2020). https:\/\/doi.org\/10.3390\/s20247013","journal-title":"Sensors"},{"key":"712_CR19","doi-asserted-by":"publisher","unstructured":"Dang, D., Di Troia, F., Stamp, M., Thuan, L.D., Van Huong, P., Van Hiep, H., Kim Khanh, N., Sharma, A., Malacaria, P., Khouzani, M.H.R.: Malware classification using long short-term memory models. In: Proc. - 2020 RIVF Int. Conf. Comput. Commun. Technol. RIVF 2020, 1\u20137 (2021) arXiv:2103.02746. https:\/\/doi.org\/10.5220\/0010378007430752","DOI":"10.5220\/0010378007430752"},{"key":"712_CR20","doi-asserted-by":"publisher","unstructured":"Sharma, A., Malacaria, P., Khouzani, M.H.R.: Malware detection using 1-dimensional convolutional neural networks. In: Proc. 4th IEEE Eur. Symp. Secur. Priv. Work. EUROS PW 2019, 247\u2013256 (2019). https:\/\/doi.org\/10.1109\/EuroSPW.2019.00034","DOI":"10.1109\/EuroSPW.2019.00034"},{"issue":"2","key":"712_CR21","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1109\/TCYB.2017.2777960Y","volume":"49","author":"SY Yerima","year":"2019","unstructured":"Yerima, S.Y., Sezer, S.: DroidFusion: a novel multilevel classifier fusion approach for android malware detection. IEEE Trans. Cybern. 49(2), 453\u2013466 (2019). https:\/\/doi.org\/10.1109\/TCYB.2017.2777960Y","journal-title":"IEEE Trans. Cybern."},{"issue":"6","key":"712_CR22","doi-asserted-by":"publisher","first-page":"5084","DOI":"10.1007\/s10664-020-09879-8","volume":"25","author":"BF Demissie","year":"2020","unstructured":"Demissie, B.F., Ceccato, M., Shar, L.K.: Security analysis of permission re-delegation vulnerabilities in Android apps. Empir. Softw. Eng. 25(6), 5084\u20135136 (2020). https:\/\/doi.org\/10.1007\/s10664-020-09879-8","journal-title":"Empir. Softw. Eng."},{"key":"712_CR23","unstructured":"Usemon (Cpu Usage Monitor) For PC Windows and MAC\u2014Free Download. https:\/\/safeforpc.com\/usemon-cpu-usage-monitor-for-pc-windows-and-mac-free-download Accessed 23 Aug 2021"},{"key":"712_CR24","first-page":"1","volume":"2021","author":"Q Wu","year":"2021","unstructured":"Wu, Q., Zhu, X., Liu, B.: A survey of android malware static detection technology based on machine learning. Mob. Inf. Syst. 2021, 1 (2021)","journal-title":"Mob. Inf. Syst."},{"issue":"04","key":"712_CR25","doi-asserted-by":"publisher","first-page":"844","DOI":"10.17577\/ijertv9is040774","volume":"V9","author":"S Jogsan","year":"2020","unstructured":"Jogsan, S.: A survey on permission based malware detection in android applications. Int. J. Eng. Res. V9(04), 844\u2013847 (2020). https:\/\/doi.org\/10.17577\/ijertv9is040774","journal-title":"Int. J. Eng. Res."},{"issue":"1","key":"712_CR26","doi-asserted-by":"publisher","first-page":"321","DOI":"10.12785\/ijcds\/100132","volume":"10","author":"AA Ali","year":"2021","unstructured":"Ali, A.A., Abdul-Qawy, H.A.S.: Static analysis of malware in android-based platforms: a progress study. Int. J. Comput. Digit. Syst. 10(1), 321\u2013331 (2021)","journal-title":"Int. J. Comput. Digit. Syst."},{"key":"712_CR27","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2020.0111159","author":"A Ghasempour","year":"2020","unstructured":"Ghasempour, A., Fazlida, N., John, O.: Permission extraction framework for android malware detection. Int. J. Adv. Comput. Sci. Appl. (2020). https:\/\/doi.org\/10.14569\/ijacsa.2020.0111159","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"712_CR28","doi-asserted-by":"publisher","unstructured":"Nguyen, T., Mcdonald, J., Glisson, W., Andel, T.: Detecting repackaged android applications using perceptual hashing. In: Proc. 53rd Hawaii Int. Conf. Syst. Sci. 3, 6641\u20136650 (2020). https:\/\/doi.org\/10.24251\/hicss.2020.813","DOI":"10.24251\/hicss.2020.813"},{"issue":"3","key":"712_CR29","doi-asserted-by":"publisher","first-page":"4676","DOI":"10.17762\/turcomat.v12i3.1884","volume":"12","author":"S Musa","year":"2021","unstructured":"Musa, S., Di, X., Mokhtar, H., Dawurang, N.: HEFESTDROID: highly effective features for android malware detection and analysis. Turk. J. Comput. Math. Educ. 12(3), 4676\u20134682 (2021). https:\/\/doi.org\/10.17762\/turcomat.v12i3.1884","journal-title":"Turk. J. Comput. Math. Educ."},{"key":"712_CR30","doi-asserted-by":"crossref","unstructured":"Fang, Z., Han, W., Li, Y.: Institutional Knowledge at Singapore Management University Permission based Android security : issues and countermeasures ScienceDirect Permission based Android security : Issues and countermeasures Permission based Android security : Issues and counterme, 205\u2013218 (2014)","DOI":"10.1016\/j.cose.2014.02.007"},{"issue":"1","key":"712_CR31","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.aej.2021.04.076","volume":"61","author":"L Li","year":"2022","unstructured":"Li, L., Ding, Y., Li, B., Qiao, M., Ye, B.: Malware classification based on double byte feature encoding. Alexandria Eng. J. 61(1), 91\u201399 (2022). https:\/\/doi.org\/10.1016\/j.aej.2021.04.076","journal-title":"Alexandria Eng. J."},{"issue":"4","key":"712_CR32","doi-asserted-by":"publisher","first-page":"1374","DOI":"10.3390\/s21041374","volume":"21","author":"J Abawajy","year":"2021","unstructured":"Abawajy, J., Darem, A., Alhashmi, A.A.: Feature subset selection for malware detection in smart IoT platforms. Sensors 21(4), 1374 (2021). https:\/\/doi.org\/10.3390\/s21041374","journal-title":"Sensors"},{"key":"712_CR33","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1016\/j.future.2020.02.002","volume":"107","author":"M Alazab","year":"2020","unstructured":"Alazab, M., Alazab, M., Shalaginov, A., Mesleh, A., Awajan, A.: Intelligent mobile malware detection using permission requests and API calls. Futur. Gener. Comput. Syst. 107, 509\u2013521 (2020). https:\/\/doi.org\/10.1016\/j.future.2020.02.002","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"7","key":"712_CR34","doi-asserted-by":"publisher","first-page":"3216","DOI":"10.1109\/TII.2017.2789219","volume":"14","author":"J Li","year":"2018","unstructured":"Li, J., Sun, L., Yan, Q., Li, Z., Srisa-An, W., Ye, H.: Significant permission identification for machine-learning-based android malware detection. IEEE Trans. Ind. Inform. 14(7), 3216\u20133225 (2018). https:\/\/doi.org\/10.1109\/TII.2017.2789219","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"3","key":"712_CR35","doi-asserted-by":"publisher","first-page":"486","DOI":"10.3390\/electronics11030486","volume":"11","author":"SY Yerima","year":"2022","unstructured":"Yerima, S.Y., Bashar, A.: A novel android botnet detection system using image-based and manifest file features. Electronics 11(3), 486 (2022)","journal-title":"Electronics"},{"key":"712_CR36","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.jpdc.2020.03.012","volume":"141","author":"G Xiao","year":"2020","unstructured":"Xiao, G., Li, J., Chen, Y., Li, K.: Malfcs: an effective malware classification framework with automated feature extraction based on deep convolutional neural networks. J. Parallel Distrib. Comput. 141, 49\u201358 (2020). https:\/\/doi.org\/10.1016\/j.jpdc.2020.03.012","journal-title":"J. Parallel Distrib. Comput."},{"issue":"5","key":"712_CR37","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1049\/iet-ifs.2019.0418","volume":"14","author":"J Thiyagarajan","year":"2020","unstructured":"Thiyagarajan, J., Akash, A., Murugan, B.: Improved real-time permission based malware detection and clustering approach using model independent pruning. IET Inf. Secur. 14(5), 531\u2013541 (2020)","journal-title":"IET Inf. Secur."},{"key":"712_CR38","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/5190138","author":"X Jiang","year":"2020","unstructured":"Jiang, X., Mao, B., Guan, J., Huang, X.: Android malware detection using fine-grained features. Sci. Programm. (2020). https:\/\/doi.org\/10.1155\/2020\/5190138","journal-title":"Sci. Programm."},{"key":"712_CR39","doi-asserted-by":"publisher","unstructured":"Tran, T.K., Sato, H.: NLP-based approaches for malware classification from API sequences. In: 2017 21st Asia Pacific Symp. Intell. Evol. Syst., pp. 101\u2013105 (2017). https:\/\/doi.org\/10.1109\/IESYS.2017.8233569","DOI":"10.1109\/IESYS.2017.8233569"},{"key":"712_CR40","doi-asserted-by":"publisher","unstructured":"Taheri, L., Kadir, A.F.A., Lashkari, A.H.: Extensible android malware detection and family classification using network-flows and API-calls. Proc. - Int. Carnahan Conf. Secur. Technol. 2019-Octob(Cic), 1\u20138 (2019). https:\/\/doi.org\/10.1109\/CCST.2019.8888430","DOI":"10.1109\/CCST.2019.8888430"},{"key":"712_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103115","volume":"76","author":"P Visalakshi","year":"2020","unstructured":"Visalakshi, P.: Detecting android malware using an improved filter based technique in embedded software. Microprocess. Microsyst. 76, 103115 (2020). https:\/\/doi.org\/10.1016\/j.micpro.2020.103115","journal-title":"Microprocess. Microsyst."},{"key":"712_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102037","volume":"99","author":"S Jha","year":"2020","unstructured":"Jha, S., Prashar, D., Long, H.V., Taniar, D.: Recurrent neural network for detecting malware. Comput. Secur. 99, 102037 (2020)","journal-title":"Comput. Secur."},{"issue":"6","key":"712_CR43","first-page":"164","volume":"10","author":"T Kim","year":"2018","unstructured":"Kim, T., Gil, W., Kim, S.: Malware classification using deep learning based on behavior analysis. Symmetry 10(6), 164 (2018)","journal-title":"Symmetry"},{"key":"712_CR44","first-page":"101","volume":"83","author":"M Ahmadi","year":"2019","unstructured":"Ahmadi, M., Dehghantanha, A., Choo, K.-K.R.: Malware detection using lstm. Comput. Secur. 83, 101\u2013121 (2019)","journal-title":"Comput. Secur."},{"key":"712_CR45","doi-asserted-by":"publisher","unstructured":"Liu, C., Liu, X., Wang, Q.: A novel malware detection approach based on lstm and attention mechanism. IEEE Access 8, 44244\u201344256 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2977427","DOI":"10.1109\/ACCESS.2020.2977427"},{"key":"712_CR46","doi-asserted-by":"publisher","unstructured":"Mahindru, A., Singh, P.: Dynamic permissions based android malware detection using machine learning techniques. ACM Int. Conf. Proceeding Ser., 202\u2013210 (2017). https:\/\/doi.org\/10.1145\/3021460.3021485","DOI":"10.1145\/3021460.3021485"},{"issue":"January","key":"712_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107138","volume":"171","author":"D Vasan","year":"2020","unstructured":"Vasan, D., Alazab, M., Wassan, S., Naeem, H., Safaei, B., Zheng, Q.: IMCFN: image-based malware classification using fine-tuned convolutional neural network architecture. Comput. Netw. 171(January), 107138 (2020). https:\/\/doi.org\/10.1016\/j.comnet.2020.107138","journal-title":"Comput. Netw."},{"issue":"1","key":"712_CR48","doi-asserted-by":"publisher","first-page":"90","DOI":"10.4018\/IJDCF.2020010105","volume":"12","author":"M Kalash","year":"2020","unstructured":"Kalash, M., Rochan, M., Mohammed, N., Bruce, N., Wang, Y., Iqbal, F.: A deep learning framework for malware classification. Int. J. Digit. Crime For. 12(1), 90\u2013108 (2020)","journal-title":"Int. J. Digit. Crime For."},{"key":"712_CR49","doi-asserted-by":"crossref","unstructured":"Booz, J., McGiff, J., Hatcher, W.G., Yu, W., Nguyen, J., Lu, C.: Tuning deep learning performance for android malware detection. In: 2018 19th IEEE\/ACIS International conference on software engineering, artificial intelligence, networking and parallel\/distributed computing (SNPD), pp. 140\u2013145 (2018). IEEE","DOI":"10.1109\/SNPD.2018.8441128"},{"key":"712_CR50","doi-asserted-by":"crossref","unstructured":"Jones, K.J., Wang, Y.: Malgazer: an automated malware classifier with running window entropy and machine learning. In: 2020 Sixth international conference on mobile and secure services (MobiSecServ), pp. 1\u20136 (2020). IEEE","DOI":"10.1109\/MobiSecServ48690.2020.9042957"},{"key":"712_CR51","doi-asserted-by":"publisher","unstructured":"Fang, Y., Gao, Y., Jing, F., Zhang, L.: Android malware familial classification based on DEX file section features. IEEE Access 8, 10614\u201310627 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2965646","DOI":"10.1109\/ACCESS.2020.2965646"},{"key":"712_CR52","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8845833","author":"F Ullah","year":"2020","unstructured":"Ullah, F., Javaid, Q., Salam, A., Ahmad, M., Sarwar, N., Shah, D., Abrar, M.: Modified decision tree technique for ransomware detection at runtime through API calls. Sci. Programm. (2020). https:\/\/doi.org\/10.1155\/2020\/8845833","journal-title":"Sci. Programm."},{"key":"712_CR53","doi-asserted-by":"publisher","unstructured":"Mahdavifar, S., Abdul Kadir, A.F., Fatemi, R., Alhadidi, D., Ghorbani, A.A.: Dynamic Android Malware Category Classification using Semi-Supervised Deep Learning. Proc. - IEEE 18th Int. Conf. Dependable, Auton. Secur. Comput. IEEE 18th Int. Conf. Pervasive Intell. Comput. IEEE 6th Int. Conf. Cloud Big Data Comput. IEEE 5th Cybe, 515\u2013522 (2020). https:\/\/doi.org\/10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00094","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00094"},{"key":"712_CR54","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Yang, Y., Wang, X.: A novel android malware detection approach based on convolutional neural network. In: Proceedings of the 2nd International conference on cryptography, security and privacy, pp. 144\u2013149 (2018)","DOI":"10.1145\/3199478.3199492"},{"key":"712_CR55","doi-asserted-by":"publisher","first-page":"39680","DOI":"10.1109\/ACCESS.2021.3063748","volume":"9","author":"LN Vu","year":"2021","unstructured":"Vu, L.N., Jung, S.: Admat: a cnn-on-matrix approach to android malware detection and classification. IEEE Access 9, 39680\u201339694 (2021)","journal-title":"IEEE Access"},{"issue":"4","key":"712_CR56","doi-asserted-by":"publisher","first-page":"608","DOI":"10.3390\/math10040608","volume":"10","author":"W-C Lin","year":"2022","unstructured":"Lin, W.-C., Yeh, Y.-R.: Efficient malware classification by binary sequences with one-dimensional convolutional neural networks. Mathematics 10(4), 608 (2022). https:\/\/doi.org\/10.3390\/math10040608","journal-title":"Mathematics"},{"key":"712_CR57","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102515","volume":"112","author":"A Tekerek","year":"2022","unstructured":"Tekerek, A., Yapici, M.M.: A novel malware classification and augmentation model based on convolutional neural network. Comput. Secur. 112, 102515 (2022)","journal-title":"Comput. Secur."},{"key":"712_CR58","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/1289175","author":"Z Wang","year":"2022","unstructured":"Wang, Z., Li, G., Zhuo, Z., Ren, X., Lin, Y., Gu, J.: A deep learning method for android application classification using semantic features. Secur. Commun. Netw. (2022). https:\/\/doi.org\/10.1155\/2022\/1289175","journal-title":"Secur. Commun. Netw."},{"key":"712_CR59","unstructured":"Zhou, Y., Jiang, X.: Android malware genome project. Dispon. a http:\/\/www.malgenomeproject.org (2012)"},{"key":"712_CR60","unstructured":"The Drebin Dataset. https:\/\/www.sec.tu-bs.de\/$sim$ddanarp\/drebin\/. Accessed 17 Aug 2021"},{"key":"712_CR61","doi-asserted-by":"publisher","unstructured":"Mamun, M.S.I., Rathore, M.A., Lashkari, A.H., Stakhanova, N., Ghorbani, A.A.: Detecting malicious URLs using lexical analysis. Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics) 9955 LNCS(September), 467\u2013482 (2016). https:\/\/doi.org\/10.1007\/978-3-319-46298-1_30","DOI":"10.1007\/978-3-319-46298-1_30"},{"issue":"1","key":"712_CR62","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10922-021-09634-4","volume":"30","author":"S Mahdavifar","year":"2022","unstructured":"Mahdavifar, S., Alhadidi, D., Ghorbani, A., et al.: Effective and efficient hybrid android malware classification using pseudo-label stacked auto-encoder. J. Netw. Syst. Manag. 30(1), 1\u201334 (2022)","journal-title":"J. Netw. Syst. Manag."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00712-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00712-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00712-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T02:15:32Z","timestamp":1695694532000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00712-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,21]]},"references-count":62,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["712"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00712-z","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,21]]},"assertion":[{"value":"21 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests as defined by Springer, or other interests that might be perceived to influence the results and\/or discussion reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All of the material is owned by the authors, and\/or no permissions are required","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}