{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T18:03:27Z","timestamp":1767981807674,"version":"3.49.0"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T00:00:00Z","timestamp":1754611200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T00:00:00Z","timestamp":1754611200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s10207-025-01110-3","type":"journal-article","created":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T11:00:51Z","timestamp":1754650851000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["PRAU-GIN: GIN-based android malware classification with traffic refinement and node augmentation"],"prefix":"10.1007","volume":"24","author":[{"given":"Tung","family":"Bui","sequence":"first","affiliation":[]},{"given":"Duc","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Linh Giang","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Van","family":"Tong","sequence":"additional","affiliation":[]},{"given":"Van","family":"Le","sequence":"additional","affiliation":[]},{"given":"Tuyen Ngoc","family":"Le","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,8]]},"reference":[{"key":"1110_CR1","doi-asserted-by":"publisher","unstructured":"Thomas, D.R., Beresford, A.R., Rice, A.: Security metrics for the android ecosystem. In: Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices. SPSM \u201915, pp. 87\u201398. Association for Computing Machinery, New York, NY, USA (2015). https:\/\/doi.org\/10.1145\/2808117.2808118 . https:\/\/doi.org\/10.1145\/2808117.2808118","DOI":"10.1145\/2808117.2808118"},{"key":"1110_CR2","unstructured":"Otuteye, B., Shams, K., Aquino, R.: How we kept the Google Play & Android app ecosystems safe in 2024 (2025). https:\/\/security.googleblog.com\/2025\/01\/how-we-kept-google-play-android-app-ecosystem-safe-2024.html"},{"key":"1110_CR3","unstructured":"ENISA Threat Landscape 2023 (2023). https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2023"},{"issue":"2","key":"1110_CR4","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1002\/spy2.361","volume":"7","author":"P Kumar","year":"2024","unstructured":"Kumar, P., Singh, S.: Enhancing android application security: A novel approach using droidxgb for malware detection based on permission analysis. Security and Privacy 7(2), 361 (2024). https:\/\/doi.org\/10.1002\/spy2.361","journal-title":"Security and Privacy"},{"issue":"6","key":"1110_CR5","doi-asserted-by":"publisher","first-page":"1687","DOI":"10.1007\/s10207-023-00712-z","volume":"22","author":"M Zyout","year":"2023","unstructured":"Zyout, M., Shatnawi, R., Najadat, H.: Malware classification approaches utilizing binary and text encoding of permissions. Int. J. Inf. Secur. 22(6), 1687\u20131712 (2023). https:\/\/doi.org\/10.1007\/s10207-023-00712-z","journal-title":"Int. J. Inf. Secur."},{"issue":"14","key":"1110_CR6","doi-asserted-by":"publisher","first-page":"25371","DOI":"10.1109\/JIOT.2024.3394555","volume":"11","author":"H Liu","year":"2024","unstructured":"Liu, H., Gong, L., Mo, X., Dong, G., Yu, J.: Ltachecker: Lightweight android malware detection based on dalvik opcode sequences using attention temporal networks. IEEE Internet Things J. 11(14), 25371\u201325381 (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3394555","journal-title":"IEEE Internet Things J."},{"key":"1110_CR7","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-981-99-8024-6_15","volume-title":"Information Security Applications","author":"I Khan","year":"2024","unstructured":"Khan, I., Kwon, Y.-W.: Multi-class malware detection via deep graph convolutional networks using tf-idf-based attributed call graphs. In: Kim, H., Youn, J. (eds.) Information Security Applications, pp. 188\u2013200. Springer, Singapore (2024)"},{"key":"1110_CR8","doi-asserted-by":"publisher","unstructured":"Mitchell, J., McLaughlin, N., Martinez-del-Rincon, J.: Generating sparse explanations for malicious android opcode sequences using hierarchical lime. Computers & Security 137, 103637 (2024) https:\/\/doi.org\/10.1016\/j.cose.2023.103637","DOI":"10.1016\/j.cose.2023.103637"},{"key":"1110_CR9","doi-asserted-by":"publisher","unstructured":"Tarwireyi, P., Terzoli, A., Adigun, M.O.: Meta-sonifieddroid: Metaheuristics for optimizing sonified android malware detection. IEEE Access 12, 134779\u2013134808 (2024) https:\/\/doi.org\/10.1109\/ACCESS.2024.3415355","DOI":"10.1109\/ACCESS.2024.3415355"},{"key":"1110_CR10","doi-asserted-by":"publisher","unstructured":"S, K.V., N, A., M, D., Kathrine, G.J.W., Palmer, G.M., Vijay, S.J.: Screening ransomware through apk analysis: Implementation of cnn models. In: 2023 International Conference on Circuit Power and Computing Technologies (ICCPCT), pp. 313\u2013318 (2023). https:\/\/doi.org\/10.1109\/ICCPCT58313.2023.10244871","DOI":"10.1109\/ICCPCT58313.2023.10244871"},{"key":"1110_CR11","doi-asserted-by":"publisher","unstructured":"Costa, L.d., Moia, V.: A lightweight and multi-stage approach for android malware detection using non-invasive machine learning techniques. IEEE Access 11, 73127\u201373144 (2023) https:\/\/doi.org\/10.1109\/ACCESS.2023.3296606","DOI":"10.1109\/ACCESS.2023.3296606"},{"issue":"13","key":"1110_CR12","doi-asserted-by":"publisher","first-page":"11343","DOI":"10.1109\/JIOT.2023.3241697","volume":"10","author":"W Niu","year":"2023","unstructured":"Niu, W., Wang, Y., Liu, X., Yan, R., Li, X., Zhang, X.: Gcdroid: Android malware detection based on graph compression with reachability relationship extraction for iot devices. IEEE Internet Things J. 10(13), 11343\u201311356 (2023). https:\/\/doi.org\/10.1109\/JIOT.2023.3241697","journal-title":"IEEE Internet Things J."},{"key":"1110_CR13","doi-asserted-by":"publisher","unstructured":"Kong, Z., Yu, X.: Automatic generation of mobile application behavior statement template based on api call graph. In: 2022 4th International Academic Exchange Conference on Science and Technology Innovation (IAECST), pp. 1358\u20131363 (2022). https:\/\/doi.org\/10.1109\/IAECST57965.2022.10061946","DOI":"10.1109\/IAECST57965.2022.10061946"},{"key":"1110_CR14","doi-asserted-by":"publisher","unstructured":"G\u00f3mez, A., Mu\u00f1oz, A.: Deep learning-based attack detection and classification in android devices. Electronics 12(15) (2023) https:\/\/doi.org\/10.3390\/electronics12153253","DOI":"10.3390\/electronics12153253"},{"key":"1110_CR15","doi-asserted-by":"publisher","unstructured":"Xie, N., Qin, Z., Di, X.: Ga-stackingmd: Android malware detection method based on genetic algorithm optimized stacking. Applied Sciences 13(4) (2023) https:\/\/doi.org\/10.3390\/app13042629","DOI":"10.3390\/app13042629"},{"issue":"15","key":"1110_CR16","doi-asserted-by":"publisher","first-page":"11373","DOI":"10.1007\/s00521-023-08303-8","volume":"35","author":"M Chaudhary","year":"2023","unstructured":"Chaudhary, M., Masood, A.: Realmalsol: real-time optimized model for android malware detection using efficient neural networks and model quantization. Neural Comput. Appl. 35(15), 11373\u201311388 (2023). https:\/\/doi.org\/10.1007\/s00521-023-08303-8","journal-title":"Neural Comput. Appl."},{"key":"1110_CR17","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-031-22064-7_16","volume-title":"Advanced Data Mining and Applications","author":"Q Zhaowei","year":"2022","unstructured":"Zhaowei, Q., Nannan, X., Gyamfi, A.C.: Android malware detection based on stacking and multi-feature fusion. In: Chen, W., Yao, L., Cai, T., Pan, S., Shen, T., Li, X. (eds.) Advanced Data Mining and Applications, pp. 199\u2013215. Springer, Cham (2022)"},{"key":"1110_CR18","doi-asserted-by":"publisher","unstructured":"Fiky, A.H.E., Elshenawy, A., Madkour, M.A.: Detection of android malware using machine learning. In: 2021 International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC), pp. 9\u201316 (2021). https:\/\/doi.org\/10.1109\/MIUCC52538.2021.9447661","DOI":"10.1109\/MIUCC52538.2021.9447661"},{"key":"1110_CR19","doi-asserted-by":"publisher","unstructured":"Egitmen, A., Gokhan\u00a0Yavuz, A., Yavuz, S.: Trconv: Multi-platform malware classification via target regulated convolutions. IEEE Access 12, 71492\u201371504 (2024) https:\/\/doi.org\/10.1109\/ACCESS.2024.3401627","DOI":"10.1109\/ACCESS.2024.3401627"},{"key":"1110_CR20","doi-asserted-by":"publisher","unstructured":"Ibrahim, M., Issa, B., Jasser, M.B.: A method for automatic android malware detection based on static analysis and deep learning. IEEE Access 10, 117334\u2013117352 (2022) https:\/\/doi.org\/10.1109\/ACCESS.2022.3219047","DOI":"10.1109\/ACCESS.2022.3219047"},{"key":"1110_CR21","doi-asserted-by":"publisher","unstructured":"Bayazit, E.C., Sahingoz, O.K., Dogan, B.: A deep learning based android malware detection system with static analysis. In: 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), pp. 1\u20136 (2022). https:\/\/doi.org\/10.1109\/HORA55278.2022.9800057","DOI":"10.1109\/HORA55278.2022.9800057"},{"key":"1110_CR22","doi-asserted-by":"publisher","unstructured":"Geremias, J., Viegas, E.K., Santin, A.O., Britto, A., Horchulhack, P.: Towards a reliable hierarchical android malware detection through image-based cnn. In: 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), pp. 242\u2013247 (2023). https:\/\/doi.org\/10.1109\/CCNC51644.2023.10060381","DOI":"10.1109\/CCNC51644.2023.10060381"},{"key":"1110_CR23","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-031-42519-6_11","volume-title":"International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023)","author":"A Miranda-Garcia","year":"2023","unstructured":"Miranda-Garcia, A., Pastor-L\u00f3pez, I., Urquijo, B.S., Puerta, J.G., Bringas, P.G.: Bytecode-based android malware detection applying convolutional neural networks. In: Garc\u00eda Bringas, P., P\u00e9rez Garc\u00eda, H., Pis\u00f3n, F.J., Mart\u00ednez \u00c1lvarez, F., Troncoso Lora, A., Herrero, \u00c1., Calvo Rolle, J.L., Quinti\u00e1n, H., Corchado, E. (eds.) International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023), pp. 111\u2013121. Springer, Cham (2023)"},{"key":"1110_CR24","doi-asserted-by":"publisher","unstructured":"He, Y., Kang, X., Yan, Q., Li, E.: Resnext+: Attention mechanisms based on resnext for malware detection and classification. IEEE Transactions on Information Forensics and Security 19, 1142\u20131155 (2024) https:\/\/doi.org\/10.1109\/TIFS.2023.3328431","DOI":"10.1109\/TIFS.2023.3328431"},{"key":"1110_CR25","doi-asserted-by":"publisher","unstructured":"Tasyurek, M., Arslan, R.S.: Rt-droid: a novel approach for real-time android application analysis with transfer learning-based cnn models. J. Real-Time Image Process. 20(3) (2023) https:\/\/doi.org\/10.1007\/s11554-023-01311-w","DOI":"10.1007\/s11554-023-01311-w"},{"issue":"5","key":"1110_CR26","doi-asserted-by":"publisher","first-page":"1115","DOI":"10.1007\/s10207-023-00679-x","volume":"22","author":"S Shi","year":"2023","unstructured":"Shi, S., Tian, S., Wang, B., Zhou, T., Chen, G.: Sfcgdroid: android malware detection based on sensitive function call graph. Int. J. Inf. Secur. 22(5), 1115\u20131124 (2023). https:\/\/doi.org\/10.1007\/s10207-023-00679-x","journal-title":"Int. J. Inf. Secur."},{"key":"1110_CR27","doi-asserted-by":"publisher","unstructured":"Gong, J., Niu, W., Li, S., Zhang, M., Zhang, X.: Sensitive behavioral chain-focused android malware detection fused with ast semantics. IEEE Transactions on Information Forensics and Security 19, 9216\u20139229 (2024) https:\/\/doi.org\/10.1109\/TIFS.2024.3468891","DOI":"10.1109\/TIFS.2024.3468891"},{"key":"1110_CR28","doi-asserted-by":"publisher","unstructured":"Liu, X., Zhang, Y., Duan, Y., Hou, B.: Android dynamic malware detection method based on system call sequences. In: 2024 9th International Conference on Intelligent Computing and Signal Processing (ICSP), pp. 275\u2013279 (2024). https:\/\/doi.org\/10.1109\/ICSP62122.2024.10744001","DOI":"10.1109\/ICSP62122.2024.10744001"},{"key":"1110_CR29","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-031-49099-6_10","volume-title":"Information Systems Security","author":"N Singh","year":"2023","unstructured":"Singh, N., Tripathy, S.: Mdldroid: Multimodal deep learning based android malware detection. In: Muthukkumarasamy, V., Sudarsan, S.D., Shyamasundar, R.K. (eds.) Information Systems Security, pp. 159\u2013177. Springer, Cham (2023)"},{"key":"1110_CR30","doi-asserted-by":"publisher","unstructured":"Waheed, M., Qadir, S., Catuogno, L.: Effective and efficient android malware detection and category classification using the enhanced kronodroid dataset. Sec. and Commun. Netw. 2024 (2024) https:\/\/doi.org\/10.1155\/2024\/7382302","DOI":"10.1155\/2024\/7382302"},{"key":"1110_CR31","doi-asserted-by":"publisher","unstructured":"Neil, A.M., Shabaan, E., El\u00a0Qout, M., Emara, K.: Machine learning based approaches for android malware detection using hybrid feature analysis. In: 2024 6th International Conference on Computing and Informatics (ICCI), pp. 158\u2013165 (2024). https:\/\/doi.org\/10.1109\/ICCI61671.2024.10485163","DOI":"10.1109\/ICCI61671.2024.10485163"},{"key":"1110_CR32","doi-asserted-by":"publisher","unstructured":"Bovenzi, G., Persico, V., Pescap\u00e9, A., Piscitelli, A., Spadari, V.: Hierarchical classification of android malware traffic. In: 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1354\u20131359 (2022). https:\/\/doi.org\/10.1109\/TrustCom56396.2022.00191","DOI":"10.1109\/TrustCom56396.2022.00191"},{"key":"1110_CR33","doi-asserted-by":"publisher","unstructured":"Zhu, Z., Zhou, H., Yang, Q., Wang, C., Li, Z.: Anomaly detection in encrypted identity resolution traffic based on machine learning. In: 2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS), pp. 264\u2013275 (2022). https:\/\/doi.org\/10.1109\/QRS57517.2022.00036","DOI":"10.1109\/QRS57517.2022.00036"},{"key":"1110_CR34","doi-asserted-by":"publisher","unstructured":"Gohari, M., Hashemi, S., Abdi, L.: Android malware detection and classification based on network traffic using deep learning. In: 2021 7th International Conference on Web Research (ICWR), pp. 71\u201377 (2021). https:\/\/doi.org\/10.1109\/ICWR51868.2021.9443025","DOI":"10.1109\/ICWR51868.2021.9443025"},{"issue":"6","key":"1110_CR35","doi-asserted-by":"publisher","first-page":"6177","DOI":"10.1007\/s11276-023-03414-5","volume":"30","author":"F Ullah","year":"2023","unstructured":"Ullah, F., Ullah, S., Srivastava, G., Lin, J.C.-W., Zhao, Y.: Nmal-droid: network-based android malware detection system using transfer learning and cnn-bigru ensemble. Wirel. Netw. 30(6), 6177\u20136198 (2023). https:\/\/doi.org\/10.1007\/s11276-023-03414-5","journal-title":"Wirel. Netw."},{"key":"1110_CR36","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1007\/978-981-99-9331-4_43","volume-title":"Frontiers in Cyber Security","author":"Y Liu","year":"2024","unstructured":"Liu, Y., Bai, X., Liu, Q., Lan, T., Zhou, L., Zhou, T.: Meta-hfmd: A hierarchical feature fusion malware detection framework via multi-task meta-learning. In: Yang, H., Lu, R. (eds.) Frontiers in Cyber Security, pp. 638\u2013654. Springer, Singapore (2024)"},{"key":"1110_CR37","doi-asserted-by":"publisher","unstructured":"Jianhua, C., Zhaohui, L., Xin, D., Xinyue, L.: A two-dimensional convolutional gated recurrent unit based method for classifying malicious encrypted traffic. In: 2023 IEEE 3rd International Conference on Electronic Technology, Communication and Information (ICETCI), pp. 149\u2013154 (2023). https:\/\/doi.org\/10.1109\/ICETCI57876.2023.10176820","DOI":"10.1109\/ICETCI57876.2023.10176820"},{"key":"1110_CR38","doi-asserted-by":"publisher","unstructured":"Yujie, P., Weina, N., Xiaosong, Z., Jie, Z., Wu, H., Ruidong, C.: End-to-end android malware classification based on pure traffic images. In: 2020 17th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), pp. 240\u2013245 (2020). https:\/\/doi.org\/10.1109\/ICCWAMTIP51612.2020.9317489","DOI":"10.1109\/ICCWAMTIP51612.2020.9317489"},{"issue":"1","key":"1110_CR39","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1007\/s10489-022-03523-2","volume":"53","author":"L Shen","year":"2022","unstructured":"Shen, L., Feng, J., Chen, Z., Sun, Z., Liang, D., Li, H., Wang, Y.: Self-attention based convolutional-lstm for android malware detection using network traffics grayscale image. Appl. Intell. 53(1), 683\u2013705 (2022). https:\/\/doi.org\/10.1007\/s10489-022-03523-2","journal-title":"Appl. Intell."},{"key":"1110_CR40","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/978-3-031-08760-8_33","volume-title":"Computational Science - ICCS 2022","author":"W Li","year":"2022","unstructured":"Li, W., Bao, H., Zhang, X.-Y., Li, L.: Amdetector: Detecting large-scale and novel android malware traffic with meta-learning. In: Groen, D., Mulatier, C., Paszynski, M., Krzhizhanovskaya, V.V., Dongarra, J.J., Sloot, P.M.A. (eds.) Computational Science - ICCS 2022, pp. 387\u2013401. Springer, Cham (2022)"},{"key":"1110_CR41","doi-asserted-by":"publisher","unstructured":"Yang, Y., Wu, H., Wang, Y., Wang, P.: Amn: Attention-based multimodal network for android malware classification. In: 2024 IEEE International Conference on Cybernetics and Intelligent Systems (CIS) and IEEE International Conference on Robotics, Automation and Mechatronics (RAM), pp. 7\u201313 (2024). https:\/\/doi.org\/10.1109\/CIS-RAM61939.2024.10672730","DOI":"10.1109\/CIS-RAM61939.2024.10672730"},{"key":"1110_CR42","doi-asserted-by":"publisher","unstructured":"Feng, J., Shen, L., Chen, Z., Wang, Y., Li, H.: A two-layer deep learning method for android malware detection using network traffic. IEEE Access 8, 125786\u2013125796 (2020) https:\/\/doi.org\/10.1109\/ACCESS.2020.3008081","DOI":"10.1109\/ACCESS.2020.3008081"},{"key":"1110_CR43","doi-asserted-by":"publisher","unstructured":"Taheri, R., Shojafar, M., Arabikhan, F., Gegov, A.: Unveiling vulnerabilities in deep learning-based malware detection: Differential privacy driven adversarial attacks. Computers & Security 146, 104035 (2024) https:\/\/doi.org\/10.1016\/j.cose.2024.104035","DOI":"10.1016\/j.cose.2024.104035"},{"key":"1110_CR44","doi-asserted-by":"publisher","unstructured":"Gao, C., Du, Y., Ma, F., Lan, Q., Chen, J., Wu, J.: A new adversarial malware detection method based on enhanced lightweight neural network. Computers & Security 147, 104078 (2024) https:\/\/doi.org\/10.1016\/j.cose.2024.104078","DOI":"10.1016\/j.cose.2024.104078"},{"key":"1110_CR45","doi-asserted-by":"publisher","unstructured":"Li, S., Tang, Z., Li, H., Zhang, J., Wang, H., Wang, J.: Gmadv: An android malware variant generation and classification adversarial training framework. Journal of Information Security and Applications 84, 103800 (2024) https:\/\/doi.org\/10.1016\/j.jisa.2024.103800","DOI":"10.1016\/j.jisa.2024.103800"},{"key":"1110_CR46","doi-asserted-by":"publisher","unstructured":"Taheri, R., Javidan, R., Pooranian, Z.: Adversarial android malware detection for mobile multimedia applications in iot environments. Multimedia Tools and Applications 80, 16713\u201316729 (2020) https:\/\/doi.org\/10.1007\/s11042-020-08804-x","DOI":"10.1007\/s11042-020-08804-x"},{"key":"1110_CR47","doi-asserted-by":"publisher","unstructured":"Golmaryami, M., Taheri, R., Pooranian, Z., Shojafar, M., Xiao, P.: Setti: A self-supervised adversarial malware detection architecture in an iot environment. ACM Trans. Multimedia Comput. Commun. Appl. 18(2s) (2022) https:\/\/doi.org\/10.1145\/3536425","DOI":"10.1145\/3536425"},{"key":"1110_CR48","doi-asserted-by":"publisher","unstructured":"Li, K., Ma, W., Duan, H., Xie, H.: Multi-source refined adversarial domain adaptation with transfer complementarity infusion for iot intrusion detection under limited samples. Expert Systems with Applications 254, 124352 (2024) https:\/\/doi.org\/10.1016\/j.eswa.2024.124352","DOI":"10.1016\/j.eswa.2024.124352"},{"key":"1110_CR49","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-024-02348-6","author":"C Mahjoub","year":"2024","unstructured":"Mahjoub, C., Hamdi, M., Alkanhel, R.I., Mohamed, S., Ejbali, R.: An adversarial environment reinforcement learning-driven intrusion detection algorithm for internet of things. EURASIP J. Wirel. Commun. Netw. (2024). https:\/\/doi.org\/10.1186\/s13638-024-02348-6","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"1110_CR50","doi-asserted-by":"publisher","unstructured":"Busch, J., Kocheturov, A., Tresp, V., Seidl, T.: Nf-gnn: Network flow graph neural networks for malware detection and classification. SSDBM \u201921, pp. 121\u2013132. Association for Computing Machinery, New York, NY, USA (2021). https:\/\/doi.org\/10.1145\/3468791.3468814 . https:\/\/doi.org\/10.1145\/3468791.3468814","DOI":"10.1145\/3468791.3468814"},{"key":"1110_CR51","doi-asserted-by":"publisher","unstructured":"Liu, T., Li, Z., Long, H., Bilal, A.: Nt-gnn: Network traffic graph for 5g mobile iot android malware detection. Electronics 12(4) (2023) https:\/\/doi.org\/10.3390\/electronics12040789","DOI":"10.3390\/electronics12040789"},{"key":"1110_CR52","doi-asserted-by":"publisher","unstructured":"Fu, Z., Liu, M., Qin, Y., Zhang, J., Zou, Y., Yin, Q., Li, Q., Duan, H.: Encrypted malware traffic detection via graph-based network analysis. RAID \u201922, pp. 495\u2013509. Association for Computing Machinery, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3545948.3545983","DOI":"10.1145\/3545948.3545983"},{"key":"1110_CR53","doi-asserted-by":"publisher","unstructured":"Ge, R., Zhang, Y., Si, C., Zhou, G., Zhou, W.: Mategraph: Toward mobile malware detection through traffic behavior graph. In: 2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC\/DSS\/SmartCity\/DependSys), pp. 801\u2013809 (2022). https:\/\/doi.org\/10.1109\/HPCC-DSS-SmartCity-DependSys57074.2022.00132","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys57074.2022.00132"},{"key":"1110_CR54","doi-asserted-by":"crossref","unstructured":"Norouzian, M.R., Xu, P., Eckert, C., Zarras, A.: Hybroid: Toward android malware detection and categorization with program code and network traffic. In: Liu, J.K., Katsikas, S., Meng, W., Susilo, W., Intan, R. (eds.) Information Security, pp. 259\u2013278. Springer, Cham (2021)","DOI":"10.1007\/978-3-030-91356-4_14"},{"key":"1110_CR55","unstructured":"Xu, K., Hu, W., Leskovec, J., Jegelka, S.: How Powerful are Graph Neural Networks? (2019). https:\/\/arxiv.org\/abs\/1810.00826"},{"key":"1110_CR56","unstructured":"Hu, W., Liu, B., Gomes, J., Zitnik, M., Liang, P., Pande, V., Leskovec, J.: Strategies for Pre-training Graph Neural Networks (2020). https:\/\/arxiv.org\/abs\/1905.12265"},{"key":"1110_CR57","doi-asserted-by":"publisher","unstructured":"Lashkari, A.H., Kadir, A.F.A., Taheri, L., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark android malware datasets and classification. In: 2018 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20137 (2018). https:\/\/doi.org\/10.1109\/CCST.2018.8585560","DOI":"10.1109\/CCST.2018.8585560"},{"key":"1110_CR58","unstructured":"Brody, S., Alon, U., Yahav, E.: How Attentive are Graph Attention Networks? (2022). https:\/\/arxiv.org\/abs\/2105.14491"},{"key":"1110_CR59","unstructured":"Kipf, T.N., Welling, M.: Semi-Supervised Classification with Graph Convolutional Networks (2017). https:\/\/arxiv.org\/abs\/1609.02907"},{"key":"1110_CR60","unstructured":"Hamilton, W.L., Ying, R., Leskovec, J.: Inductive representation learning on large graphs. In: Proceedings of the 31st International Conference on Neural Information Processing Systems. NIPS\u201917, pp. 1025\u20131035. Curran Associates Inc., Red Hook, NY, USA (2017)"},{"key":"1110_CR61","doi-asserted-by":"publisher","unstructured":"Garcia, S., Parmisano, A., Erquiaga, M.J.: IoT-23: A Labeled Dataset with Malicious and Benign IoT Network Traffic. https:\/\/doi.org\/10.5281\/zenodo.4743746 . https:\/\/doi.org\/10.5281\/zenodo.4743746","DOI":"10.5281\/zenodo.4743746"},{"key":"1110_CR62","doi-asserted-by":"publisher","unstructured":"Neto, E.C.P., Dadkhah, S., Ferreira, R., Zohourian, A., Lu, R., Ghorbani, A.A.: Ciciot2023: A real-time dataset and benchmark for large-scale attacks in iot environment. Sensors 23(13) (2023) https:\/\/doi.org\/10.3390\/s23135941","DOI":"10.3390\/s23135941"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01110-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01110-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01110-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T11:37:51Z","timestamp":1760614671000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01110-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,8]]},"references-count":62,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["1110"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01110-3","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,8]]},"assertion":[{"value":"8 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"192"}}