{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:15:11Z","timestamp":1771467311027,"version":"3.50.1"},"reference-count":151,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T00:00:00Z","timestamp":1744156800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T00:00:00Z","timestamp":1744156800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s10207-025-01027-x","type":"journal-article","created":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T10:35:51Z","timestamp":1744194951000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Comprehensive review on machine learning and deep learning techniques for malware detection in android and IoT devices"],"prefix":"10.1007","volume":"24","author":[{"given":"Wesam","family":"Almobaideen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2485-9237","authenticated-orcid":false,"given":"Orieb","family":"Abu Alghanam","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Abdullah","sequence":"additional","affiliation":[]},{"given":"Syed Basit","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Umar","family":"Alam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,9]]},"reference":[{"key":"1027_CR1","unstructured":"Hasan, M.: State of IoT 2021: Number of Connected IoT Devices Growing 9 globally, Cellular IoT Now Surpassing 2 Billion. https:\/\/iot-analytics.com\/number-connected-iot-devices\/ (2022)"},{"key":"1027_CR2","unstructured":"Laricchia, F.: Mobile OS market share 2019 | Statista. Statista. https:\/\/www.statista.com\/statistics\/272698\/global-market-share-held-by-mobile-operating-systems-since-2009\/ (2019)"},{"key":"1027_CR3","unstructured":"Statista: Worldwide annual internet of things (IoT) attacks from 2016 to 2022. statista (2022). Accessed 17 Aug 2023"},{"key":"1027_CR4","unstructured":"Labs, A.A.: Av-atlas: The at &t alien labs threat intelligence platform. AT &T Alien Labs (Year of Retrieval). Accessed 17 Aug 2023"},{"issue":"2","key":"1027_CR5","first-page":"20","volume":"8","author":"R Tahir","year":"2018","unstructured":"Tahir, R.: A study on malware and malware detection techniques. Int. J. Educ. Manage. Eng. 8(2), 20 (2018)","journal-title":"Int. J. Educ. Manage. Eng."},{"key":"1027_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101861","volume":"112","author":"J Singh","year":"2021","unstructured":"Singh, J., Singh, J.: A survey on machine learning-based malware detection in executable files. J. Syst. Architect. 112, 101861 (2021)","journal-title":"J. Syst. Architect."},{"issue":"5","key":"1027_CR7","doi-asserted-by":"publisher","first-page":"529","DOI":"10.3390\/e23050529","volume":"23","author":"M Rabbani","year":"2021","unstructured":"Rabbani, M., Wang, Y., Khoshkangini, R., Jelodar, H., Zhao, R., Bagheri-Baba-Ahmadi, S., Ayobi, S.: A review on machine learning approaches for network malicious behavior detection in emerging technologies. Entropy 23(5), 529 (2021)","journal-title":"Entropy"},{"key":"1027_CR8","doi-asserted-by":"crossref","unstructured":"Ali, R., Ali, A., Iqbal, F., Hussain, M., Ullah, F., et al.: Deep learning methods for malware and intrusion detection: A systematic literature review. Secur. Commun. Netw. (2022)","DOI":"10.1155\/2022\/2959222"},{"key":"1027_CR9","unstructured":"sciencedirectm: Machine Learning - ScienceDirect. https:\/\/www.sciencedirect.com\/topics\/computer-science\/machine-learning"},{"key":"1027_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100529","volume":"47","author":"M Gopinath","year":"2023","unstructured":"Gopinath, M., Sethuraman, S.C.: A comprehensive survey on deep learning based malware detection techniques. Comput. Sci. Rev. 47, 100529 (2023)","journal-title":"Comput. Sci. Rev."},{"key":"1027_CR11","doi-asserted-by":"crossref","unstructured":"Baghirov, E.: Techniques of malware detection: Research review. In: 2021 IEEE 15th International Conference on Application of Information and Communication Technologies (AICT), pp. 1\u20136 (2021). IEEE","DOI":"10.1109\/AICT52784.2021.9620415"},{"key":"1027_CR12","doi-asserted-by":"crossref","unstructured":"Pachhala, N., Jothilakshmi, S., Battula, B.P.: A comprehensive survey on identification of malware types and malware classification using machine learning techniques. In: 2021 2nd International Conference on Smart Electronics and Communication (ICOSEC), pp. 1207\u20131214. IEEE (2021)","DOI":"10.1109\/ICOSEC51865.2021.9591763"},{"issue":"3","key":"1027_CR13","doi-asserted-by":"publisher","first-page":"2023764","DOI":"10.1080\/17517575.2021.2023764","volume":"17","author":"A Gaurav","year":"2023","unstructured":"Gaurav, A., Gupta, B.B., Panigrahi, P.K.: A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system. Enterp. Inf. Syst. 17(3), 2023764 (2023)","journal-title":"Enterp. Inf. Syst."},{"key":"1027_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.future.2021.11.030","volume":"130","author":"P Maniriho","year":"2022","unstructured":"Maniriho, P., Mahmood, A.N., Chowdhury, M.J.M.: A study on malicious software behaviour analysis and detection techniques: taxonomy, current trends and challenges. Futur. Gener. Comput. Syst. 130, 1\u201318 (2022)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"1027_CR15","unstructured":"statistics, M.: Malware statistics. Malware statistics (2023)"},{"key":"1027_CR16","unstructured":"Software, C.P.: 2023 mid-year cyber security report. Check point software (2023)"},{"key":"1027_CR17","unstructured":"Labs, M.: Adware: The unwanted guest. Malwarebytes labs (2023)"},{"key":"1027_CR18","doi-asserted-by":"crossref","unstructured":"Sk, H.K.: A literature review on android mobile malware detection using machine learning techniques. In: 2022 6th International Conference on Computing Methodologies and Communication (ICCMC), pp. 986\u2013991. IEEE (2022)","DOI":"10.1109\/ICCMC53470.2022.9753746"},{"key":"1027_CR19","unstructured":"Alliance, C.S.R.: 2022 malware research report. Cyber Security Researchers Alliance (2022)"},{"key":"1027_CR20","unstructured":"Labs, M.: Mcafee threats report q2 2023. Mcafee threats report (2023)"},{"key":"1027_CR21","unstructured":"Research, C.P.: 2023 security trends report. Check point research (2023)"},{"key":"1027_CR22","doi-asserted-by":"crossref","unstructured":"Kakati, S., Chouhan, D., Nag, A., Panja, S.: Survey on recent malware detection techniques for IoT. In: Pattern Recognition and Data Analysis with Applications, pp. 647\u2013659. Springer (2022)","DOI":"10.1007\/978-981-19-1520-8_53"},{"key":"1027_CR23","unstructured":"Varonis: 84 must-know data breach statistics [2023]. Varonis (2023)"},{"key":"1027_CR24","unstructured":"Labs, M.: Rootkits: A stealthy threat that\u2019s on the rise. Rootkits (2023)"},{"key":"1027_CR25","unstructured":"NordVPN: Spyware statistics 2022. Spyware Statistics 2022 (2022)"},{"key":"1027_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-023-10693-w","author":"A Azmoodeh","year":"2024","unstructured":"Azmoodeh, A.: A review on machine learning-based malware detection techniques for internet of things (IoT) environments. Wireless Pers. Commun. (2024). https:\/\/doi.org\/10.1007\/s11277-023-10693-w","journal-title":"Wireless Pers. Commun."},{"key":"1027_CR27","unstructured":"Kaspersky: IoT Threat Report 2023. https:\/\/securelist.com\/iot-threat-report-2023\/110644\/ (2023)"},{"key":"1027_CR28","doi-asserted-by":"publisher","unstructured":"Vijayakanthan, R., Waguespack, K.M., Ahmed, I., Ali-Gombe, A.: Fortifying iot devices: Ai-driven intrusion detection via memory-encoded audio signals. In: 2023 IEEE Secure Development Conference (SecDev), pp. 106\u2013117. https:\/\/doi.org\/10.1109\/SecDev56634.2023.00025 (2023)","DOI":"10.1109\/SecDev56634.2023.00025"},{"key":"1027_CR29","unstructured":"News, T.H.: Kmsdbot malware gets upgrade, now capable of cryptojacking and spreading laterally. The Hacker News (2023). Accessed 4 June 2024"},{"key":"1027_CR30","unstructured":"Securonix: Detecting the enemybot botnet: Advisory. Securonix (2023). Accessed 4 June 2024"},{"key":"1027_CR31","unstructured":"Fortinet: Rapperbot malware discovery. RapperBot Malware Discovery (2023). Accessed 4 June 2024"},{"key":"1027_CR32","unstructured":"Lumen: Chaos is a go-based swiss army knife of malware. Lumen (2023). Accessed 4 June 2024"},{"key":"1027_CR33","unstructured":"Technica, A.: New linux malware combines unusual stealth with a full suite of capabilities. Ars Technica (2022). Accessed 4 June 2024"},{"key":"1027_CR34","unstructured":"Security, P.: February 2024: Latest malware, vulnerabilities, and exploits. Picus Security (2024). Accessed 4 June 2024"},{"key":"1027_CR35","unstructured":"Picus Security: February 2024: Latest Malware Vulnerabilities and Exploits. https:\/\/www.picussecurity.com\/resource\/blog\/february-2024-latest-malware-vulnerabilities-and-exploits (2024)"},{"key":"1027_CR36","unstructured":"Kaspersky: IoT Threat Report 2023. https:\/\/securelist.com\/iot-threat-report-2023\/110644\/ (2023)"},{"key":"1027_CR37","unstructured":"ThreatPost: Gafgyt Botnet Launching DDoS Attacks. https:\/\/threatpost.com\/gafgyt-botnet-ddos-mirai\/165424\/. Accessed 23 Feb 2025"},{"key":"1027_CR38","unstructured":"Research, C.: Prometei Botnet Exploiting Microsoft Exchange Vulnerabilities. https:\/\/www.cybereason.com\/blog\/research\/prometei-botnet-exploiting-microsoft-exchange-vulnerabilities. Accessed 23 Feb 2025"},{"key":"1027_CR39","unstructured":"Alerts, N.D.C.: CC-2524: Cyber Alert from NHS Digital. https:\/\/digital.nhs.uk\/cyber-alerts\/2018\/cc-2524. Accessed 23 Feb 2025"},{"key":"1027_CR40","unstructured":"BankInfoSecurity: Updated Prism Backdoor Discovered. https:\/\/www.bankinfosecurity.com\/updated-prism-backdoor-discovered-a-17367. Accessed 23 Feb 2025"},{"key":"1027_CR41","doi-asserted-by":"crossref","unstructured":"Carrillo-Mondejar, J., Suarez-Tangil, G., Costin, A., Rodr\u00edguez, R.J.: Exploring shifting patterns in recent IoT malware. In: European Conference on Cyber Warfare and Security, vol. 23 (2024)","DOI":"10.34190\/eccws.23.1.2280"},{"key":"1027_CR42","unstructured":"Magazine, I.: Nation-State Malware Targets Industrial Firms. https:\/\/www.infosecurity-magazine.com\/news\/malware-nation-sate-industrial\/ (2025). Accessed 22 Feb 2025"},{"key":"1027_CR43","unstructured":"Cybersecurity, (CISA), I.S.A., Investigation\u00a0(FBI), F.B.: Known Indicators of Compromise Associated with Androxgh0st Malware. https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa24-016a (2024). Accessed 22 Feb 2025"},{"key":"1027_CR44","unstructured":"Roviello, M., Strino, A., Valentini, F.: Toxicpanda: a new banking trojan from Asia hit Europe and Latam (2024). Accessed 22 Feb 2025"},{"key":"1027_CR45","unstructured":"Micro, T.: IoT Botnet Linked to Large-Scale DDoS Attacks. https:\/\/www.trendmicro.com\/en_us\/research\/25\/a\/iot-botnet-linked-to-ddos-attacks.html (2024). Accessed 22 Feb 2025"},{"key":"1027_CR46","first-page":"1","volume":"2021","author":"Q Wu","year":"2021","unstructured":"Wu, Q., Zhu, X., Liu, B.: A survey of android malware static detection technology based on machine learning. Mob. Inf. Syst. 2021, 1\u201318 (2021)","journal-title":"Mob. Inf. Syst."},{"issue":"1","key":"1027_CR47","doi-asserted-by":"publisher","first-page":"21","DOI":"10.11113\/ijic.v13n1.384","volume":"13","author":"YZ Wei","year":"2023","unstructured":"Wei, Y.Z., Md-Arshad, M., Samad, A.A., Ithnin, N.: Comparing malware attack detection using machine learning techniques in IoT network traffic. Int. J. Innov. Comput. 13(1), 21\u201327 (2023)","journal-title":"Int. J. Innov. Comput."},{"key":"1027_CR48","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-031-23690-7_6","volume-title":"Information Systems Security","author":"V Bansal","year":"2022","unstructured":"Bansal, V., Ghosh, M., Baliyan, N.: Efficient and effective static android malware detection using machine learning. In: Badarla, V.R., Nepal, S., Shyamasundar, R.K. (eds.) Information Systems Security, pp. 103\u2013118. Springer, Cham (2022)"},{"key":"1027_CR49","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.ins.2017.04.044","volume":"433\u2013434","author":"Z Chen","year":"2018","unstructured":"Chen, Z., Yan, Q., Han, H., Wang, S., Peng, L., Wang, L., Yang, B.: Machine learning based mobile malware detection using highly imbalanced network traffic. Inf. Sci. 433\u2013434, 346\u2013364 (2018). https:\/\/doi.org\/10.1016\/j.ins.2017.04.044","journal-title":"Inf. Sci."},{"key":"1027_CR50","doi-asserted-by":"publisher","unstructured":"Smith, D., Khorsandroo, S., Roy, K.: Supervised and unsupervised learning techniques utilizing malware datasets. In: 2023 IEEE 2nd International Conference on AI in Cybersecurity (ICAIC), pp. 1\u20137. https:\/\/doi.org\/10.1109\/ICAIC57335.2023.10044169 (2023)","DOI":"10.1109\/ICAIC57335.2023.10044169"},{"key":"1027_CR51","doi-asserted-by":"crossref","unstructured":"Kumar, A., Lim, T.J.: Edima: Early detection of iot malware network activity using machine learning techniques. In: 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), pp. 289\u2013294. IEEE (2019)","DOI":"10.1109\/WF-IoT.2019.8767194"},{"key":"1027_CR52","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102779","volume":"120","author":"R Chaganti","year":"2022","unstructured":"Chaganti, R., Ravi, V., Pham, T.D.: Deep learning based cross architecture internet of things malware detection and classification. Comput. Secur. 120, 102779 (2022)","journal-title":"Comput. Secur."},{"issue":"1","key":"1027_CR53","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1109\/TR.2020.2982537","volume":"70","author":"R Surendran","year":"2020","unstructured":"Surendran, R., Thomas, T., Emmanuel, S.: On existence of common malicious system call codes in android malware families. IEEE Trans. Reliab. 70(1), 248\u2013260 (2020)","journal-title":"IEEE Trans. Reliab."},{"key":"1027_CR54","doi-asserted-by":"crossref","unstructured":"Mbunge, E., Muchemwa, B., Batani, J., Mbuyisa, N.: A review of deep learning models to detect malware in android applications. Cyber Secur. Appl. 100014 (2023)","DOI":"10.1016\/j.csa.2023.100014"},{"issue":"27","key":"1027_CR55","first-page":"10","volume":"11","author":"S Baek","year":"2021","unstructured":"Baek, S., Jeon, J., Jeong, B., Jeong, Y.-S.: Two-stage hybrid malware detection using deep learning. HCIS 11(27), 10\u201322967 (2021)","journal-title":"HCIS"},{"key":"1027_CR56","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102098","volume":"101","author":"Z Ren","year":"2020","unstructured":"Ren, Z., Wu, H., Ning, Q., Hussain, I., Chen, B.: End-to-end malware detection for android IoT devices using deep learning. Ad Hoc Netw. 101, 102098 (2020)","journal-title":"Ad Hoc Netw."},{"key":"1027_CR57","doi-asserted-by":"publisher","first-page":"181102","DOI":"10.1109\/ACCESS.2020.3028370","volume":"8","author":"Z Wang","year":"2020","unstructured":"Wang, Z., Liu, Q., Chi, Y.: Review of android malware detection based on deep learning. IEEE Access 8, 181102\u2013181126 (2020)","journal-title":"IEEE Access"},{"key":"1027_CR58","doi-asserted-by":"crossref","unstructured":"Yumlembam, R., Issac, B., Jacob, S.M., Yang, L.: Iot-based android malware detection using graph neural network with adversarial defense. IEEE Int. Things J. (2022)","DOI":"10.1109\/JIOT.2022.3188583"},{"key":"1027_CR59","unstructured":"Wang, R., Wang, F., Zhang, R., Lin, M., Zhu, W.: Gat-attac: An attention-based graph neural network for network traffic anomaly detection. In: Proceedings of the 29th ACM SIGSAC Conference on Computer and Communications Security, pp. 3067\u20133082 (2022)"},{"key":"1027_CR60","doi-asserted-by":"crossref","unstructured":"Smmarwar, S.K., Gupta, G.P., Kumar, S.: Android malware detection and identification frameworks by leveraging the machine and deep learning techniques: A comprehensive review. Telemat. Inf. Rep. 100130 (2024)","DOI":"10.1016\/j.teler.2024.100130"},{"key":"1027_CR61","volume":"16","author":"A Bensaoud","year":"2024","unstructured":"Bensaoud, A., Kalita, J., Bensaoud, M.: A survey of malware detection using deep learning. Mach. Learn. Appl. 16, 100546 (2024)","journal-title":"Mach. Learn. Appl."},{"key":"1027_CR62","doi-asserted-by":"crossref","unstructured":"Ghaffari, A., Jelodari, N., pouralish, S., derakhshanfard, N., Arasteh, B.: Securing internet of things using machine and deep learning methods: a survey. Cluster Comput. pp. 1\u201325 (2024)","DOI":"10.1007\/s10586-024-04509-0"},{"key":"1027_CR63","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109233","volume":"117","author":"F Nawshin","year":"2024","unstructured":"Nawshin, F., Gad, R., Unal, D., Al-Ali, A.K., Suganthan, P.N.: Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey. Comput. Electr. Eng. 117, 109233 (2024)","journal-title":"Comput. Electr. Eng."},{"issue":"1","key":"1027_CR64","doi-asserted-by":"publisher","first-page":"32","DOI":"10.3390\/fi16010032","volume":"16","author":"H Khazane","year":"2024","unstructured":"Khazane, H., Ridouani, M., Salahdine, F., Kaabouch, N.: A holistic review of machine learning adversarial attacks in IoT networks. Future Internet 16(1), 32 (2024)","journal-title":"Future Internet"},{"issue":"1","key":"1027_CR65","doi-asserted-by":"publisher","first-page":"51","DOI":"10.71330\/thenucleus.2024.1349","volume":"61","author":"A Wajid","year":"2024","unstructured":"Wajid, A., Ahmed, T., Chaudhry, U.B.: A comprehensive review of machine learning-based malware detection techniques for windows platform. The Nucleus 61(1), 51\u201362 (2024)","journal-title":"The Nucleus"},{"issue":"6","key":"1027_CR66","doi-asserted-by":"publisher","first-page":"1968","DOI":"10.3390\/s24061968","volume":"24","author":"SH Rafique","year":"2024","unstructured":"Rafique, S.H., Abdallah, A., Musa, N.S., Murugan, T.: Machine learning and deep learning techniques for internet of things network anomaly detection-current research trends. Sensors 24(6), 1968 (2024)","journal-title":"Sensors"},{"key":"1027_CR67","doi-asserted-by":"crossref","unstructured":"Bhat, P., Behal, S., Dutta, K.: Machine learning and deep learning techniques for detecting malicious android applications: An empirical analysis. Proc. Indian Natl. Sci. Acad. pp 1\u201316 (2023)","DOI":"10.1007\/s43538-023-00182-w"},{"issue":"8","key":"1027_CR68","first-page":"1","volume":"55","author":"Y Liu","year":"2022","unstructured":"Liu, Y., Tantithamthavorn, C., Li, L., Liu, Y.: Deep learning for android malware defenses: a systematic literature review. ACM Comput. Surv. 55(8), 1\u201336 (2022)","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"1027_CR69","doi-asserted-by":"publisher","first-page":"28","DOI":"10.3390\/cryptography5040028","volume":"5","author":"H Sayadi","year":"2021","unstructured":"Sayadi, H., Gao, Y., Mohammadi Makrani, H., Lin, J., Costa, P.C., Rafatirad, S., Homayoun, H.: Towards accurate run-time hardware-assisted stealthy malware detection: a lightweight, yet effective time series cnn-based approach. Cryptography 5(4), 28 (2021)","journal-title":"Cryptography"},{"key":"1027_CR70","doi-asserted-by":"crossref","unstructured":"Ogundokun, R.O., Basil, U., Babatunde, A.N., Abdulahi, A.T., Adenike, A.R., Adebiyi, A.A.: Intrusion detection systems based on machine learning approaches: A systematic review. In: 2023 International Conference on Science, Engineering and Business for Sustainable Development Goals (SEB-SDG), vol. 1, pp. 01\u201304 (2023). IEEE","DOI":"10.1109\/SEB-SDG57117.2023.10124506"},{"key":"1027_CR71","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102996","volume":"124","author":"B Molina-Coronado","year":"2023","unstructured":"Molina-Coronado, B., Mori, U., Mendiburu, A., Miguel-Alonso, J.: Towards a fair comparison and realistic evaluation framework of android malware detectors based on static analysis and machine learning. Comput. Secur. 124, 102996 (2023)","journal-title":"Comput. Secur."},{"key":"1027_CR72","doi-asserted-by":"crossref","unstructured":"Alsharif, M., Rawat, D.B.: Machine learning enabled intrusion detection for edge devices in the internet of things. In: 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0361\u20130367 (2023). IEEE","DOI":"10.1109\/CCWC57344.2023.10099276"},{"issue":"11","key":"1027_CR73","doi-asserted-by":"publisher","first-page":"2308","DOI":"10.3390\/sym14112308","volume":"14","author":"MS Akhtar","year":"2022","unstructured":"Akhtar, M.S., Feng, T.: Detection of malware by deep learning as CNN-LSTM machine learning techniques in real time. Symmetry 14(11), 2308 (2022)","journal-title":"Symmetry"},{"key":"1027_CR74","doi-asserted-by":"publisher","unstructured":"Nakhodchi, S., Upadhyay, A., Dehghantanha, A.: A comparison between different machine learning models for iot malware detection. Security of Cyber-Physical Systems: Vulnerability and Impact, pp. 195\u2013202. https:\/\/doi.org\/10.1007\/978-3-030-45541-5_10 (2020)","DOI":"10.1007\/978-3-030-45541-5_10"},{"key":"1027_CR75","doi-asserted-by":"publisher","first-page":"96899","DOI":"10.1109\/ACCESS.2020.2995887","volume":"8","author":"J Jeon","year":"2020","unstructured":"Jeon, J., Park, J.H., Jeong, Y.-S.: Dynamic analysis for iot malware detection with convolution neural network model. IEEE Access 8, 96899\u201396911 (2020)","journal-title":"IEEE Access"},{"key":"1027_CR76","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102098","volume":"101","author":"Z Ren","year":"2020","unstructured":"Ren, Z., Wu, H., Ning, Q., Hussain, I., Chen, B.: End-to-end malware detection for android IoT devices using deep learning. Ad Hoc Netw. 101, 102098 (2020). https:\/\/doi.org\/10.1016\/j.adhoc.2020.102098","journal-title":"Ad Hoc Netw."},{"key":"1027_CR77","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100373","volume":"40","author":"T Sharma","year":"2021","unstructured":"Sharma, T., Rattan, D.: Malicious application detection in android-a systematic literature review. Comput. Sci. Rev. 40, 100373 (2021)","journal-title":"Comput. Sci. Rev."},{"key":"1027_CR78","doi-asserted-by":"crossref","unstructured":"Chowdhury, M.N.-U.-R., Haque, A., Soliman, H., Hossen, M.S., Fatima, T., Ahmed, I.: Android malware detection using machine learning: A review. arXiv preprint arXiv:2307.02412 (2023)","DOI":"10.36227\/techrxiv.22580881"},{"issue":"13","key":"1027_CR79","doi-asserted-by":"publisher","first-page":"1606","DOI":"10.3390\/electronics10131606","volume":"10","author":"J Senanayake","year":"2021","unstructured":"Senanayake, J., Kalutarage, H., Al-Kadri, M.O.: Android mobile malware detection using machine learning: a systematic review. Electronics 10(13), 1606 (2021)","journal-title":"Electronics"},{"key":"1027_CR80","doi-asserted-by":"crossref","unstructured":"Tirandasu, R.K., Prasanth, Y.: A review on malicious software detection using machine learning algorithms. In: 2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC), pp. 1945\u20131948. IEEE (2021)","DOI":"10.1109\/ICESC51422.2021.9532700"},{"key":"1027_CR81","doi-asserted-by":"crossref","unstructured":"Alsmadi, T., Alqudah, N.: A survey on malware detection techniques. In: 2021 International Conference on Information Technology (ICIT), pp. 371\u2013376. IEEE (2021)","DOI":"10.1109\/ICIT52682.2021.9491765"},{"key":"1027_CR82","doi-asserted-by":"crossref","unstructured":"Muzaffar, A., Hassen, H.R., Lones, M.A., Zantout, H.: An in-depth review of machine learning based android malware detection. Comput. Secur. 102833 (2022)","DOI":"10.1016\/j.cose.2022.102833"},{"key":"1027_CR83","doi-asserted-by":"crossref","unstructured":"Verma, A.K., Sharma, S.K.: Malware detection approaches using machine learning techniques-strategic survey. In: 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), pp. 1958\u20131962. IEEE (2021)","DOI":"10.1109\/ICAC3N53548.2021.9725369"},{"issue":"1 &2","key":"1027_CR84","doi-asserted-by":"publisher","first-page":"235","DOI":"10.56471\/slujst.v6i.371","volume":"6","author":"M Ibrahim","year":"2023","unstructured":"Ibrahim, M., Abdullahi, A., Ahmad, M.A., Mustapha, R.: A comparative analysis of android malware detection with and without feature selection techniques using machine. SLU J. Sci. Technol. 6(1 &2), 235\u2013246 (2023)","journal-title":"SLU J. Sci. Technol."},{"key":"1027_CR85","unstructured":"Rawat, N., Singh, A.: Permission-based malware detection in android using machine learning. Comput. Secur. (2020)"},{"key":"1027_CR86","doi-asserted-by":"publisher","first-page":"844","DOI":"10.1016\/j.future.2020.10.008","volume":"115","author":"SI Imtiaz","year":"2021","unstructured":"Imtiaz, S.I., Rehman, S., Javed, A.R., Jalil, Z., Liu, X., Alnumay, W.S.: Deepamd: Detection and identification of android malware using high-efficient deep artificial neural network. Futur. Gener. Comput. Syst. 115, 844\u2013856 (2021)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"1027_CR87","doi-asserted-by":"crossref","unstructured":"Kambar, M.E.Z.N., Esmaeilzadeh, A., Kim, Y., Taghva, K.: A survey on mobile malware detection methods using machine learning. In: 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0215\u20130221. IEEE (2022)","DOI":"10.1109\/CCWC54503.2022.9720753"},{"key":"1027_CR88","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.jnca.2018.12.014","volume":"133","author":"S Wang","year":"2019","unstructured":"Wang, S., Chen, Z., Yan, Q., Yang, B., Peng, L., Jia, Z.: A mobile malware detection method using behavior features in network traffic. J. Netw. Comput. Appl. 133, 15\u201325 (2019). https:\/\/doi.org\/10.1016\/j.jnca.2018.12.014","journal-title":"J. Netw. Comput. Appl."},{"key":"1027_CR89","doi-asserted-by":"publisher","unstructured":"Atluri, V.: Malware classification of portable executables using tree-based ensemble machine learning. In: 2019 SoutheastCon, pp. 1\u20136. https:\/\/doi.org\/10.1109\/SoutheastCon42311.2019.9020524 (2019)","DOI":"10.1109\/SoutheastCon42311.2019.9020524"},{"key":"1027_CR90","doi-asserted-by":"publisher","unstructured":"Castillo, A., Lineses, A.B., Go, B., Labanan, R., Octaviano, M.: Trojan malware detection using ann, na\u00efve bayes and svm machine learning algorithms. In: 2022 2nd International Conference in Information and Computing Research (iCORE), pp. 72\u201376. https:\/\/doi.org\/10.1109\/iCORE58172.2022.00033 (2022)","DOI":"10.1109\/iCORE58172.2022.00033"},{"issue":"1","key":"1027_CR91","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1038\/s41597-024-03027-3","volume":"11","author":"S Aurangzeb","year":"2024","unstructured":"Aurangzeb, S., Aleem, M., Khan, M.T., Loukas, G., Sakellari, G.: Androdex: Android dex images of obfuscated malware. Sci. Data 11(1), 212 (2024). https:\/\/doi.org\/10.1038\/s41597-024-03027-3","journal-title":"Sci. Data"},{"key":"1027_CR92","doi-asserted-by":"publisher","first-page":"73481","DOI":"10.1109\/ACCESS.2024.3400211","volume":"12","author":"I Almomani","year":"2024","unstructured":"Almomani, I., Almashat, T., El-Shafai, W.: Maloid-ds: Labeled dataset for android malware forensics. IEEE Access 12, 73481\u201373546 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3400211","journal-title":"IEEE Access"},{"key":"1027_CR93","doi-asserted-by":"publisher","unstructured":"Parvathi, S., Ponraj, A., Parabrahmachari, S., M, A., Kumar, M.P., Krishnan, V.G.: Android malware detection using deep transfer learning model for iot applications. In: 2024 IEEE International Conference on Communication, Computing and Signal Processing (IICCCS), pp. 1\u20136. https:\/\/doi.org\/10.1109\/IICCCS61609.2024.10763662 (2024)","DOI":"10.1109\/IICCCS61609.2024.10763662"},{"key":"1027_CR94","doi-asserted-by":"publisher","unstructured":"Jeebodh, M.R., Baliyan, N.: Iot malware detection using deep learning. In: 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT), pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICCCNT61001.2024.10724403 (2024)","DOI":"10.1109\/ICCCNT61001.2024.10724403"},{"key":"1027_CR95","doi-asserted-by":"publisher","unstructured":"Javed, H., Zeng, F., Shaheer, M.: A novel deep ensemble framework for iot malware variant detection. In: 2024 IEEE International Conference on Smart Internet of Things (SmartIoT), pp. 457\u2013462. https:\/\/doi.org\/10.1109\/SmartIoT62235.2024.00076 (2024)","DOI":"10.1109\/SmartIoT62235.2024.00076"},{"key":"1027_CR96","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103969","volume":"144","author":"G Duan","year":"2024","unstructured":"Duan, G., Liu, H., Cai, M., Sun, J., Chen, H.: Madroid: A maliciousness-aware multifeatured dataset for detecting android malware. Comput. Secu. 144, 103969 (2024). https:\/\/doi.org\/10.1016\/j.cose.2024.103969","journal-title":"Comput. Secu."},{"key":"1027_CR97","doi-asserted-by":"publisher","unstructured":"Singh, D., Khurana, S.: Malware detection in iot devices using machine learning: A review. In: 2024 International Conference on Computational Intelligence and Computing Applications (ICCICA), vol. 1, pp. 203\u2013209. https:\/\/doi.org\/10.1109\/ICCICA60014.2024.10585149 (2024)","DOI":"10.1109\/ICCICA60014.2024.10585149"},{"key":"1027_CR98","doi-asserted-by":"publisher","first-page":"173168","DOI":"10.1109\/ACCESS.2024.3485706","volume":"12","author":"SJ Altaha","year":"2024","unstructured":"Altaha, S.J., Aljughaiman, A., Gul, S.: A survey on android malware detection techniques using supervised machine learning. IEEE Access 12, 173168\u2013173191 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3485706","journal-title":"IEEE Access"},{"key":"1027_CR99","doi-asserted-by":"publisher","DOI":"10.1016\/j.teler.2024.100130","volume":"14","author":"SK Smmarwar","year":"2024","unstructured":"Smmarwar, S.K., Gupta, G.P., Kumar, S.: Android malware detection and identification frameworks by leveraging the machine and deep learning techniques: a comprehensive review. Telemat. Inf. Rep. 14, 100130 (2024). https:\/\/doi.org\/10.1016\/j.teler.2024.100130","journal-title":"Telemat. Inf. Rep."},{"key":"1027_CR100","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-024-02643-x","author":"A Joomye","year":"2024","unstructured":"Joomye, A., Ling, M.H., Yau, K.-L.A.: A brief survey of deep learning methods for android malware detection. Int. J. Syst. Assur. Eng. Manag. (2024). https:\/\/doi.org\/10.1007\/s13198-024-02643-x","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"key":"1027_CR101","unstructured":"Cybersecurity, C.I.: DNSExfiltrator - DNS Tunneling Exfiltration Dataset. https:\/\/www.unb.ca\/cic\/datasets\/dns-exf-2021.html. Accessed CURRENT_DATE (2021)"},{"key":"1027_CR102","doi-asserted-by":"publisher","unstructured":"Kumar, A., Lim, T.J.: Edima: Early detection of iot malware network activity using machine learning techniques. In: 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), pp. 289\u2013294. https:\/\/doi.org\/10.1109\/WF-IoT.2019.8767194 (2019)","DOI":"10.1109\/WF-IoT.2019.8767194"},{"key":"1027_CR103","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101743","volume":"92","author":"M Jerbi","year":"2020","unstructured":"Jerbi, M., Dagdia, Z.C., Bechikh, S., Said, L.B.: On the use of artificial malicious patterns for android malware detection. Comput. Secur. 92, 101743 (2020)","journal-title":"Comput. Secur."},{"key":"1027_CR104","doi-asserted-by":"publisher","unstructured":"Cersosimo, M., Lara, A.: Detecting malicious domains using the splunk machine learning toolkit. In: NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium, pp. 1\u20136. https:\/\/doi.org\/10.1109\/NOMS54207.2022.9789899 (2022)","DOI":"10.1109\/NOMS54207.2022.9789899"},{"key":"1027_CR105","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.106030","volume":"122","author":"K Shaukat","year":"2023","unstructured":"Shaukat, K., Luo, S., Varadharajan, V.: A novel deep learning-based approach for malware detection. Eng. Appl. Artif. Intell. 122, 106030 (2023)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"1027_CR106","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-030-70852-8_3","volume-title":"Secure IT Systems","author":"Z Afzal","year":"2021","unstructured":"Afzal, Z., Brunstrom, A., Lindskog, S.: Using features of encrypted network traffic to detect malware. In: Asplund, M., Nadjm-Tehrani, S. (eds.) Secure IT Systems, pp. 37\u201353. Springer, Cham (2021)"},{"issue":"9","key":"1027_CR107","doi-asserted-by":"publisher","first-page":"6883","DOI":"10.1016\/j.jksuci.2021.08.033","volume":"34","author":"N Zakeya","year":"2022","unstructured":"Zakeya, N., S\u00e9gla, K., Chamseddine, T., Alvine, B.B.: Probing Androvul dataset for studies on android malware classification. J. King Saud Univ. Comput. Inf. Sci. 34(9), 6883\u20136894 (2022)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"1027_CR108","unstructured":"Liang, Y., Vankayalapati, N.: Machine learning and deep learning methods for better anomaly detection in IoT-23 dataset cybersecurity. Preprint. https:\/\/github.com\/yliang725\/Anomaly-Detection-IoT23 (2022). Accessed 22 Dec 2022"},{"key":"1027_CR109","doi-asserted-by":"publisher","unstructured":"Nugroho, F.C.: Malware Dataset IDN. IEEE Dataport (2024). https:\/\/doi.org\/10.21227\/2ym4-s997","DOI":"10.21227\/2ym4-s997"},{"key":"1027_CR110","doi-asserted-by":"publisher","unstructured":"Al\u00a0Kinoon, A., Alghamd, A., Alghuried, A., Mohaisen, D.: Troid: Temporal and Cross-Sectional Android Dataset and its Applications. IEEE Dataport (2024). https:\/\/doi.org\/10.21227\/95my-tf46","DOI":"10.21227\/95my-tf46"},{"key":"1027_CR111","unstructured":"Attarde, P.: CICIoV2024 Decimal CSV. https:\/\/www.kaggle.com\/datasets\/pushpakattarde\/ciciov2024decimalcsv (2024). Accessed 27 June 2024"},{"key":"1027_CR112","unstructured":"Dataset, I.-.: IoT-23 Dataset. https:\/\/www.stratosphereips.org\/datasets-iot23"},{"key":"1027_CR113","unstructured":"2022, I.D.: IoT Dataset 2022. https:\/\/www.unb.ca\/cic\/datasets\/iotdataset-2022.html"},{"key":"1027_CR114","unstructured":"Cybersecurity, C.I.: MALMEM - Android Malware Dataset. https:\/\/www.unb.ca\/cic\/datasets\/malmem-2022.html. Accessed CURRENT_DATE (2022)"},{"key":"1027_CR115","unstructured":"Dataset, A.M.: Android Mischief Dataset. https:\/\/www.stratosphereips.org\/android-mischief-dataset"},{"key":"1027_CR116","unstructured":"Cybersecurity, C.I.: ANDMAL - Android Malware Dataset. https:\/\/www.unb.ca\/cic\/datasets\/andmal2020.html. Accessed CURRENT_DATE (2020)"},{"key":"1027_CR117","unstructured":"Cybersecurity, C.I.: DOHBRW - DNS-over-HTTPS (DoH) and DNS-over-TLS (DoT) Browser Requests Dataset. https:\/\/www.unb.ca\/cic\/datasets\/dohbrw-2020.html. Accessed CURRENT_DATE (2020)"},{"key":"1027_CR118","unstructured":"Cybersecurity, C.I.: DDoS - UNB CIC DDoS Attack Dataset. https:\/\/www.unb.ca\/cic\/datasets\/ddos-2019.html. Accessed CURRENT_DATE (2019)"},{"key":"1027_CR119","unstructured":"ID\u00a01339, D.: Dataset with ID 1339. https:\/\/www.impactcybertrust.org\/dataset_view?idDataset=1339"},{"key":"1027_CR120","unstructured":"Datasets, T.: ToNIoT Datasets. https:\/\/research.unsw.edu.au\/projects\/toniot-datasets"},{"key":"1027_CR121","unstructured":"Dataset, B.-I.: Bot-IoT Dataset. https:\/\/research.unsw.edu.au\/projects\/bot-iot-dataset"},{"key":"1027_CR122","unstructured":"Anderson, H.S., Roth, P.: Ember: an open dataset for training static pe malware machine learning models. arXiv preprint arXiv:1804.04637 (2018)"},{"key":"1027_CR123","unstructured":"Website, V.: VirusShare Website. https:\/\/virusshare.com\/"},{"key":"1027_CR124","unstructured":"Cybersecurity, C.I.: ANDMAL - Android Malware Dataset. https:\/\/www.unb.ca\/cic\/datasets\/andmal2017.html. Accessed CURRENT_DATE (2017)"},{"key":"1027_CR125","unstructured":"Cybersecurity, C.I.: Maldroid - Android Malware Dataset. https:\/\/www.unb.ca\/cic\/datasets\/maldroid-2020.html. Accessed CURRENT_DATE (2020)"},{"key":"1027_CR126","unstructured":"Malwares\u00a0Dataset, C.: Classification of Malwares Dataset. https:\/\/www.kaggle.com\/datasets\/saurabhshahane\/classification-of-malwares"},{"key":"1027_CR127","doi-asserted-by":"publisher","unstructured":"Ronen, R., Radu, M., Feuerstein, C., Yom-Tov, E., Ahmadi, M.: Microsoft Malware Classification Challenge (2018). https:\/\/doi.org\/10.48550\/arXiv.1802.10135.","DOI":"10.48550\/arXiv.1802.10135."},{"key":"1027_CR128","unstructured":"Arp, D., Spreitzenbarth, M., Huebner, M., Gascon, H., Rieck, K., Carsten, C.: Drebin - Android Malware Dataset. https:\/\/www.sec.cs.tu-bs.de\/~danarp\/drebin\/. Accessed CURRENT_DATE (Year of Dataset Publication)"},{"key":"1027_CR129","doi-asserted-by":"publisher","unstructured":"Allix, K., Bissyand\u00e9, T.F., Klein, J., Le\u00a0Traon, Y.: Androzoo: Collecting millions of android apps for the research community. In: Proceedings of the 13th International Conference on Mining Software Repositories. MSR \u201916, pp. 468\u2013471. ACM, New York, NY, USA (2016). https:\/\/doi.org\/10.1145\/2901739.2903508","DOI":"10.1145\/2901739.2903508"},{"key":"1027_CR130","unstructured":"Website, V.: VirusTotal Website. http:\/\/www.virustotal.com"},{"key":"1027_CR131","unstructured":"Blog, C.D.: Contagio Dump Blog. http:\/\/contagiodump.blogspot.com\/"},{"key":"1027_CR132","unstructured":"Project, M.G.: Malware Genome Project. http:\/\/www.malgenomeproject.org\/. Accessed CURRENT_DATE"},{"key":"1027_CR133","unstructured":"Website, A.: ArgusLab Website. http:\/\/amd.arguslab.org"},{"key":"1027_CR134","doi-asserted-by":"publisher","unstructured":"Mariappan, U., Balakrishnan, D., Rajendran, S., Alagusundar, N., Sheriff, A.A., K, A.: Cyber security threat detection in internet of things using optimized deep learning technique. In: 2023 3rd Asian Conference on Innovation in Technology (ASIANCON), pp. 1\u20136. https:\/\/doi.org\/10.1109\/ASIANCON58793.2023.10270285 (2023)","DOI":"10.1109\/ASIANCON58793.2023.10270285"},{"key":"1027_CR135","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-030-93247-3_28","volume-title":"Intelligent Computing and Optimization","author":"MS Hossain","year":"2022","unstructured":"Hossain, M.S., Riaz, M.H.: Android malware detection system: A machine learning and deep learning based multilayered approach. In: Vasant, P., Zelinka, I., Weber, G.-W. (eds.) Intelligent Computing and Optimization, pp. 277\u2013287. Springer, Cham (2022)"},{"key":"1027_CR136","doi-asserted-by":"publisher","unstructured":"Elayan, O.N., Mustafa, A.M.: Android malware detection using deep learning. Procedia Computer Science 184, 847\u2013852 (2021) https:\/\/doi.org\/10.1016\/j.procs.2021.03.106.The 12th International Conference on Ambient Systems, Networks and Technologies (ANT)\/The 4th International Conference on Emerging Data and Industry 4.0 (EDI40) \/ Affiliated Workshops","DOI":"10.1016\/j.procs.2021.03.106."},{"issue":"2","key":"1027_CR137","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1109\/TNSM.2021.3075315","volume":"18","author":"M Dib","year":"2021","unstructured":"Dib, M., Torabi, S., Bou-Harb, E., Assi, C.: A multi-dimensional deep learning framework for IoT malware classification and family attribution. IEEE Trans. Netw. Serv. Manage. 18(2), 1165\u20131177 (2021). https:\/\/doi.org\/10.1109\/TNSM.2021.3075315","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"5","key":"1027_CR138","doi-asserted-by":"publisher","first-page":"3770","DOI":"10.1109\/JIOT.2021.3100063","volume":"9","author":"B Yuan","year":"2022","unstructured":"Yuan, B., Wang, J., Wu, P., Qing, X.: IoT malware classification based on lightweight convolutional neural networks. IEEE Internet Things J. 9(5), 3770\u20133783 (2022). https:\/\/doi.org\/10.1109\/JIOT.2021.3100063","journal-title":"IEEE Internet Things J."},{"key":"1027_CR139","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-18936-9","author":"M Asam","year":"2022","unstructured":"Asam, M., Khan, S.H., Akbar, A., Bibi, S., Jamal, T., Khan, A., Ghafoor, U., Bhutta, M.R.: IoT malware detection architecture using a novel channel boosted and squeezed CNN. Sci. Rep. (2022). https:\/\/doi.org\/10.1038\/s41598-022-18936-9","journal-title":"Sci. Rep."},{"key":"1027_CR140","doi-asserted-by":"publisher","DOI":"10.3390\/s22114302","author":"S Ben Atitallah","year":"2022","unstructured":"Ben Atitallah, S., Driss, M., Almomani, I.: A novel detection and multi-classification approach for IoT-malware using random forest voting of fine-tuning convolutional neural networks. Sensors (2022). https:\/\/doi.org\/10.3390\/s22114302","journal-title":"Sensors"},{"issue":"23","key":"1027_CR141","doi-asserted-by":"publisher","first-page":"16946","DOI":"10.1109\/JIOT.2021.3075694","volume":"8","author":"Q Li","year":"2021","unstructured":"Li, Q., Mi, J., Li, W., Wang, J., Cheng, M.: CNN-based malware variants detection method for internet of things. IEEE Internet Things J. 8(23), 16946\u201316962 (2021). https:\/\/doi.org\/10.1109\/JIOT.2021.3075694","journal-title":"IEEE Internet Things J."},{"key":"1027_CR142","unstructured":"Mohamed, A.S., Khalil, I., Abdeen, M.A., Ghaleb, A.A.: Andywar: an intelligent android malware detection using machine learning. In: Innovations in Systems and Software Engineering, pp. 249\u2013258. Springer, Cham (2018)"},{"key":"1027_CR143","unstructured":"Alzahrani, M., Al-Jarallah, M., Aldwaihi, M., Alghamdi, A., Al-Shatri, M.: A study on android malware detection using machine learning algorithms. vol 28, pp. 1563\u20131577 (2018)"},{"key":"1027_CR144","unstructured":"Alshamrani, K., Alshamrani, S., Alshahrani, M., Alshayeb, M., Alayba, A., Alzahrani, M.: Malware attack detection on iot devices using machine learning. In: SpringerLink, pp. 406\u2013416. Springer, Cham (2018)"},{"issue":"7","key":"1027_CR145","first-page":"4543","volume":"31","author":"MZ Shafiq","year":"2019","unstructured":"Shafiq, M.Z., Asghar, M.U., Mumtaz, W.A., Butt, M.T., Idrees, Z.: Mldroid-framework for android malware detection using machine learning techniques. Neural Comput. Appl. 31(7), 4543\u20134564 (2019)","journal-title":"Neural Comput. Appl."},{"key":"1027_CR146","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-981-16-1866-6_10","volume-title":"Mobile Computing and Sustainable Informatics","author":"SS Vanjire","year":"2022","unstructured":"Vanjire, S.S., Lakshmi, M.: Mdta: a new approach of supervised machine learning for android malware detection and threat attribution using behavioral reports. In: Shakya, S., Bestak, R., Palanisamy, R., Kamel, K.A. (eds.) Mobile Computing and Sustainable Informatics, pp. 147\u2013159. Springer, Singapore (2022)"},{"key":"1027_CR147","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-981-15-5616-6_22","volume-title":"Data Management, Analytics and Innovation","author":"P Agrawal","year":"2021","unstructured":"Agrawal, P., Trivedi, B.: Machine learning classifiers for android malware detection. In: Sharma, N., Chakrabarti, A., Balas, V.E., Martinovic, J. (eds.) Data Management, Analytics and Innovation, pp. 311\u2013322. Springer, Singapore (2021)"},{"key":"1027_CR148","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-981-16-0965-7_4","volume-title":"Computer Networks, Big Data and IoT","author":"P Agrawal","year":"2021","unstructured":"Agrawal, P., Trivedi, B.: Androhealthcheck: a malware detection system for android using machine learning. In: Pandian, A.P., Fernando, X., Islam, S.M.S. (eds.) Computer Networks, Big Data and IoT, pp. 35\u201341. Springer, Singapore (2021)"},{"key":"1027_CR149","doi-asserted-by":"publisher","unstructured":"Fiky, A.H.E., Elshenawy, A., Madkour, M.A.: Detection of android malware using machine learning. In: 2021 International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC), pp. 9\u201316. https:\/\/doi.org\/10.1109\/MIUCC52538.2021.9447661 (2021)","DOI":"10.1109\/MIUCC52538.2021.9447661"},{"key":"1027_CR150","doi-asserted-by":"publisher","first-page":"24533","DOI":"10.1007\/s11042-021-10647-z","volume":"80","author":"SV Dehkordy","year":"2021","unstructured":"Dehkordy, S.V., Rasoolzadegan, A.: A new machine learning-based method for android malware detection on imbalanced dataset. Multimed. Tools Appl. 80, 24533\u201324554 (2021). https:\/\/doi.org\/10.1007\/s11042-021-10647-z","journal-title":"Multimed. Tools Appl."},{"key":"1027_CR151","doi-asserted-by":"publisher","unstructured":"Gupta, S.K., Pattnaik, B., Agrawal, V., Boddu, R.S.K., Srivastava, A., Hazela, B.: Malware detection using genetic cascaded support vector machine classifier in internet of things. In: 2022 Second International Conference on Computer Science, Engineering and Applications (ICCSEA), pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICCSEA54677.2022.9936404 (2022)","DOI":"10.1109\/ICCSEA54677.2022.9936404"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01027-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01027-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01027-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:11:45Z","timestamp":1750500705000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01027-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,9]]},"references-count":151,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1027"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01027-x","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,9]]},"assertion":[{"value":"9 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"110"}}