{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T05:54:37Z","timestamp":1769925277720,"version":"3.49.0"},"reference-count":85,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T00:00:00Z","timestamp":1769040000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T00:00:00Z","timestamp":1769040000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100002985","name":"Delhi Technological University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002985","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s10207-025-01170-5","type":"journal-article","created":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T14:16:34Z","timestamp":1769091394000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["PICCdroid: A novel permissions and intent correlation coefficient based android malware detection method"],"prefix":"10.1007","volume":"25","author":[{"given":"Suruchi","family":"Jain","sequence":"first","affiliation":[]},{"given":"Anshul","family":"Arora","sequence":"additional","affiliation":[]},{"given":"Dhirendra","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,22]]},"reference":[{"key":"1170_CR1","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: User attention, comprehension, and behavior. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1\u201314 (2012)","DOI":"10.1145\/2335356.2335360"},{"key":"1170_CR2","doi-asserted-by":"crossref","unstructured":"Swaminathan, A., Ramakrishnan, B., et al.: Prediction of cyber-attacks and criminality using machine learning algorithms. In: 2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), pp. 547\u2013552 (2022). IEEE","DOI":"10.1109\/3ICT56508.2022.9990652"},{"issue":"2","key":"1170_CR3","first-page":"1433","volume":"5","author":"V Rao","year":"2017","unstructured":"Rao, V., Hande, K.: A comparative study of static, dynamic and hybrid analysis techniques for android malware detection. International Journal of Engineering Development and Research 5(2), 1433\u20131436 (2017)","journal-title":"International Journal of Engineering Development and Research"},{"issue":"1","key":"1170_CR4","first-page":"4157156","volume":"2018","author":"T Chen","year":"2018","unstructured":"Chen, T., Mao, Q., Yang, Y., Lv, M., Zhu, J., et al.: Tinydroid: a lightweight and efficient model for android malware detection and classification. Mobile information systems 2018(1), 4157156 (2018)","journal-title":"Mobile information systems"},{"key":"1170_CR5","doi-asserted-by":"crossref","unstructured":"Ghasempour, A., Sani, N.F.M., Ovye, J.A.: Permission extraction framework for android malware detection. International Journal of Advanced Computer Science and Applications 11(11) (2020)","DOI":"10.14569\/IJACSA.2020.0111159"},{"key":"1170_CR6","doi-asserted-by":"publisher","first-page":"24533","DOI":"10.1007\/s11042-021-10647-z","volume":"80","author":"DT Dehkordy","year":"2021","unstructured":"Dehkordy, D.T., Rasoolzadegan, A.: A new machine learning-based method for android malware detection on imbalanced dataset. Multimedia Tools and Applications 80, 24533\u201324554 (2021)","journal-title":"Multimedia Tools and Applications"},{"key":"1170_CR7","doi-asserted-by":"crossref","unstructured":"Firdaus, A., Anuar, N.B., Karim, A., Razak, M.F.A.: Discovering optimal features using static analysis and a genetic search based method for android malware detection. Frontiers of Information Technology & Electronic Engineering 19(6), 712\u2013736 (2018)","DOI":"10.1631\/FITEE.1601491"},{"key":"1170_CR8","first-page":"23","volume":"14","author":"D Arp","year":"2014","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., Siemens, C.: Drebin: Effective and explainable detection of android malware in your pocket. Ndss 14, 23\u201326 (2014)","journal-title":"Ndss"},{"issue":"11","key":"1170_CR9","doi-asserted-by":"publisher","first-page":"1869","DOI":"10.1109\/TIFS.2014.2353996","volume":"9","author":"W Wang","year":"2014","unstructured":"Wang, W., Wang, X., Feng, D., Liu, J., Han, Z., Zhang, X.: Exploring permission-induced risk in android applications for malicious application detection. IEEE Trans. Inf. Forensics Secur. 9(11), 1869\u20131882 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"7","key":"1170_CR10","doi-asserted-by":"publisher","first-page":"3216","DOI":"10.1109\/TII.2017.2789219","volume":"14","author":"J Li","year":"2018","unstructured":"Li, J., Sun, L., Yan, Q., Li, Z., Srisa-An, W., Ye, H.: Significant permission identification for machine-learning-based android malware detection. IEEE Trans. Industr. Inf. 14(7), 3216\u20133225 (2018)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"3","key":"1170_CR11","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1016\/j.icte.2021.09.003","volume":"8","author":"SRT Mat","year":"2022","unstructured":"Mat, S.R.T., Ab Razak, M.F., Kahar, M.N.M., Arif, J.M., Firdaus, A.: A bayesian probability model for android malware detection. ICT Express 8(3), 424\u2013431 (2022)","journal-title":"ICT Express"},{"key":"1170_CR12","doi-asserted-by":"publisher","first-page":"1968","DOI":"10.1109\/TIFS.2019.2950134","volume":"15","author":"A Arora","year":"2019","unstructured":"Arora, A., Peddoju, S.K., Conti, M.: Permpair: Android malware detection using permission pairs. IEEE Trans. Inf. Forensics Secur. 15, 1968\u20131982 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1170_CR13","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.cose.2017.03.011","volume":"68","author":"F Idrees","year":"2017","unstructured":"Idrees, F., Rajarajan, M., Conti, M., Chen, T.M., Rahulamathavan, Y.: Pindroid: A novel android malware detection system using ensemble learning methods. Computers & Security 68, 36\u201346 (2017)","journal-title":"Computers & Security"},{"key":"1170_CR14","doi-asserted-by":"crossref","unstructured":"Verma, S., Muttoo, S.: An android malware detection framework-based on permissions and intents. Defence Science Journal 66(6) (2016)","DOI":"10.14429\/dsj.66.10803"},{"issue":"1","key":"1170_CR15","doi-asserted-by":"publisher","first-page":"123","DOI":"10.3390\/sym15010123","volume":"15","author":"ES Alomari","year":"2023","unstructured":"Alomari, E.S., Nuiaa, R.R., Alyasseri, Z.A.A., Mohammed, H.J., Sani, N.S., Esa, M.I., Musawi, B.A.: Malware detection using deep learning and correlation-based feature selection. Symmetry 15(1), 123 (2023)","journal-title":"Symmetry"},{"key":"1170_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102696","volume":"58","author":"A Mathur","year":"2021","unstructured":"Mathur, A., Podila, L.M., Kulkarni, K., Niyaz, Q., Javaid, A.Y.: Naticusdroid: A malware detection framework for android using native and custom permissions. Journal of Information Security and Applications 58, 102696 (2021)","journal-title":"Journal of Information Security and Applications"},{"key":"1170_CR17","doi-asserted-by":"crossref","unstructured":"Jain, S., Kapoor, S., Arora, A., Sharma, S.K.: Android malware analysis using coefficient of multiple correlation. In: 2023 IEEE Symposium on Wireless Technology & Applications (ISWTA), pp. 72\u201377 (2023). IEEE","DOI":"10.1109\/ISWTA58588.2023.10249690"},{"key":"1170_CR18","doi-asserted-by":"crossref","unstructured":"Amalina, S.A., Rafrastara, F.A., Ibadullah, M.: Android malware detection using fast correlation based filter and random forest algorithm. In: 2024 International Seminar on Application for Technology of Information and Communication (iSemantic), pp. 365\u2013370 (2024). IEEE","DOI":"10.1109\/iSemantic63362.2024.10762386"},{"key":"1170_CR19","doi-asserted-by":"crossref","unstructured":"Jain, A., Rustagi, L., Aggarwal, M., Arora, A.: Corrdroid-android malware detection using association amongst permissions. In: 2023 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), pp. 1\u20136 (2023). IEEE","DOI":"10.1109\/CONECCT57959.2023.10234798"},{"key":"1170_CR20","doi-asserted-by":"crossref","unstructured":"Schmidt, A.-D., Schmidt, H.-G., Batyuk, L., Clausen, J.H., Camtepe, S.A., Albayrak, S., Yildizli, C.: Smartphone malware evolution revisited: Android next target? In: 2009 4th International Conference on Malicious and Unwanted Software (MALWARE), pp. 1\u20137 (2009). IEEE","DOI":"10.1109\/MALWARE.2009.5403026"},{"key":"1170_CR21","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: Characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy, pp. 95\u2013109 (2012). IEEE","DOI":"10.1109\/SP.2012.16"},{"key":"1170_CR22","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 3\u201314 (2011)","DOI":"10.1145\/2046614.2046618"},{"key":"1170_CR23","doi-asserted-by":"crossref","unstructured":"Manimaran, A., Kartheesan, L., Kumutha, D., Surendran, R., et al.: An optimized hybrid deep learning framework for monitoring botnet attacks in iot networks. In: 2024 International Conference on IoT Based Control Networks and Intelligent Systems (ICICNIS), pp. 487\u2013492 (2024). IEEE","DOI":"10.1109\/ICICNIS64247.2024.10823344"},{"issue":"4","key":"1170_CR24","doi-asserted-by":"publisher","first-page":"4899","DOI":"10.1002\/ett.4899","volume":"35","author":"T Vaiyapuri","year":"2024","unstructured":"Vaiyapuri, T., Shankar, K., Rajendran, S., Kumar, S., Gaur, V., Gupta, D., Alharbi, M.: Automated cyberattack detection using optimal ensemble deep learning model. Transactions on Emerging Telecommunications Technologies 35(4), 4899 (2024)","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"1170_CR25","doi-asserted-by":"publisher","first-page":"189180","DOI":"10.1109\/ACCESS.2024.3387475","volume":"12","author":"R Surendran","year":"2024","unstructured":"Surendran, R., Uddin, M.M., Thomas, T., Pradeep, G.: Android malware detection based on informative syscall subsequences. IEEe Access 12, 189180\u2013189190 (2024)","journal-title":"IEEe Access"},{"key":"1170_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2024.103920","volume":"92","author":"HD Misalkar","year":"2025","unstructured":"Misalkar, H.D., Harshavardhanan, P.: Tdbamla: Temporal and dynamic behavior analysis in android malware using lstm and attention mechanisms. Computer Standards & Interfaces 92, 103920 (2025)","journal-title":"Computer Standards & Interfaces"},{"key":"1170_CR27","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.pmcj.2016.03.003","volume":"32","author":"J Song","year":"2016","unstructured":"Song, J., Han, C., Wang, K., Zhao, J., Ranjan, R., Wang, L.: An integrated static detection and analysis framework for android. Pervasive Mob. Comput. 32, 15\u201325 (2016)","journal-title":"Pervasive Mob. Comput."},{"key":"1170_CR28","doi-asserted-by":"crossref","unstructured":"Peng, H., Gates, C., Sarma, B., Li, N., Qi, Y., Potharaju, R., Nita-Rotaru, C., Molloy, I.: Using probabilistic generative models for ranking risks of android apps. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 241\u2013252 (2012)","DOI":"10.1145\/2382196.2382224"},{"key":"1170_CR29","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/j.procs.2020.06.081","volume":"174","author":"Z Shen","year":"2020","unstructured":"Shen, Z., Rehman, M.U., Chen, W., Liu, Y., Liu, J., Zhong, T.: A method based on modified pagerank-algorithm for measuring and rating android malwares. Procedia Computer Science 174, 252\u2013255 (2020)","journal-title":"Procedia Computer Science"},{"key":"1170_CR30","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1016\/j.future.2016.05.035","volume":"80","author":"G Dini","year":"2018","unstructured":"Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A., Sgandurra, D.: Risk analysis of android applications: A user-centric solution. Futur. Gener. Comput. Syst. 80, 505\u2013518 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"1170_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.diin.2015.01.001","volume":"13","author":"KA Talha","year":"2015","unstructured":"Talha, K.A., Alper, D.I., Aydin, C.: Apk auditor: Permission-based android malware detection system. Digit. Investig. 13, 1\u201314 (2015)","journal-title":"Digit. Investig."},{"key":"1170_CR32","doi-asserted-by":"crossref","unstructured":"Feng, Y., Anand, S., Dillig, I., Aiken, A.: Apposcopy: Semantics-based detection of android malware through static analysis. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 576\u2013587 (2014)","DOI":"10.1145\/2635868.2635869"},{"key":"1170_CR33","doi-asserted-by":"crossref","unstructured":"Ding, Y., Zhang, X., Hu, J., Xu, W.: Android malware detection method based on bytecode image, 1\u201310 (2020)","DOI":"10.1109\/ICMLC48188.2019.8949298"},{"key":"1170_CR34","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.infsof.2016.03.004","volume":"75","author":"S Wu","year":"2016","unstructured":"Wu, S., Wang, P., Li, X., Zhang, Y.: Effective detection of android malware based on the usage of data flow apis and machine learning. Inf. Softw. Technol. 75, 17\u201325 (2016)","journal-title":"Inf. Softw. Technol."},{"key":"1170_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107932","volume":"189","author":"N Lu","year":"2021","unstructured":"Lu, N., Li, D., Shi, W., Vijayakumar, P., Piccialli, F., Chang, V.: An efficient combined deep neural network based malware detection framework in 5g environment. Comput. Netw. 189, 107932 (2021)","journal-title":"Comput. Netw."},{"key":"1170_CR36","doi-asserted-by":"publisher","first-page":"2947","DOI":"10.1007\/s11277-018-5982-0","volume":"103","author":"Y Liu","year":"2018","unstructured":"Liu, Y., Zhang, L., Huang, X.: Using g features to improve the efficiency of function call graph based android malware detection. Wireless Pers. Commun. 103, 2947\u20132955 (2018)","journal-title":"Wireless Pers. Commun."},{"issue":"5","key":"1170_CR37","doi-asserted-by":"publisher","first-page":"1115","DOI":"10.1007\/s10207-023-00679-x","volume":"22","author":"S Shi","year":"2023","unstructured":"Shi, S., Tian, S., Wang, B., Zhou, T., Chen, G.: Sfcgdroid: android malware detection based on sensitive function call graph. Int. J. Inf. Secur. 22(5), 1115\u20131124 (2023)","journal-title":"Int. J. Inf. Secur."},{"key":"1170_CR38","doi-asserted-by":"crossref","unstructured":"Bhattacharya, A., Goswami, R.T.: DMDAM: data mining based detection of android malware. In: Proceedings of the First International Conference on Intelligent Computing and Communication, pp. 187\u2013194 (2017). Springer","DOI":"10.1007\/978-981-10-2035-3_20"},{"key":"1170_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102929","volume":"61","author":"JM Arif","year":"2021","unstructured":"Arif, J.M., Ab Razak, M.F., Mat, S.R.T., Awang, S., Ismail, N.S.N., Firdaus, A.: Android mobile malware detection using fuzzy ahp. Journal of Information Security and Applications 61, 102929 (2021)","journal-title":"Journal of Information Security and Applications"},{"issue":"1","key":"1170_CR40","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1016\/j.dss.2010.08.028","volume":"50","author":"C-F Tsai","year":"2010","unstructured":"Tsai, C.-F., Hsiao, Y.-C.: Combining multiple feature selection methods for stock prediction: Union, intersection, and multi-intersection approaches. Decis. Support Syst. 50(1), 258\u2013269 (2010)","journal-title":"Decis. Support Syst."},{"key":"1170_CR41","unstructured":"Saleem, M.S., Mi\u0161i\u0107, J., Mi\u0161i\u0107, V.B.: Android malware detection using feature ranking of permissions. arXiv preprint arXiv:2201.08468 (2022)"},{"issue":"9","key":"1170_CR42","doi-asserted-by":"publisher","first-page":"1263","DOI":"10.1109\/TKDE.2008.239","volume":"21","author":"H He","year":"2009","unstructured":"He, H., Garcia, E.A.: Learning from imbalanced data. IEEE Trans. Knowl. Data Eng. 21(9), 1263\u20131284 (2009)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"2","key":"1170_CR43","doi-asserted-by":"publisher","first-page":"277","DOI":"10.3390\/app9020277","volume":"9","author":"R Kumar","year":"2019","unstructured":"Kumar, R., Zhang, X., Khan, R.U., Sharif, A.: Research on data mining of permission-induced risk for android iot devices. Appl. Sci. 9(2), 277 (2019)","journal-title":"Appl. Sci."},{"key":"1170_CR44","doi-asserted-by":"publisher","first-page":"68","DOI":"10.35940\/ijeat.E2593.0610521","volume":"10","author":"S Gupta","year":"2021","unstructured":"Gupta, S., Sethi, S., Chaudhary, S., Arora, A.: Blockchain based detection of android malware using ranked permissions. Int. J. Eng. Adv. Technol 10, 68\u201375 (2021)","journal-title":"Int. J. Eng. Adv. Technol"},{"issue":"6","key":"1170_CR45","doi-asserted-by":"publisher","first-page":"1687","DOI":"10.1007\/s10207-023-00712-z","volume":"22","author":"M Zyout","year":"2023","unstructured":"Zyout, M., Shatnawi, R., Najadat, H.: Malware classification approaches utilizing binary and text encoding of permissions. Int. J. Inf. Secur. 22(6), 1687\u20131712 (2023)","journal-title":"Int. J. Inf. Secur."},{"key":"1170_CR46","doi-asserted-by":"crossref","unstructured":"Pathak, A., Barman, U., Kumar, T.S.: Machine learning approach to detect android malware using feature-selection based on feature importance score. Journal of Engineering Research (2024)","DOI":"10.1016\/j.jer.2024.04.008"},{"issue":"1","key":"1170_CR47","first-page":"48","volume":"9","author":"J Jung","year":"2019","unstructured":"Jung, J., Kim, H.-J., Cho, S.-J., Han, S., Suh, K.: Efficient android malware detection using api rank and machine learning. J. Internet Serv. Inf. Secur. 9(1), 48\u201359 (2019)","journal-title":"J. Internet Serv. Inf. Secur."},{"issue":"6","key":"1170_CR48","doi-asserted-by":"publisher","first-page":"1252","DOI":"10.1109\/TIFS.2016.2523912","volume":"11","author":"K Xu","year":"2016","unstructured":"Xu, K., Li, Y., Deng, R.H.: Iccdetector: Icc-based malware detection on android. IEEE Trans. Inf. Forensics Secur. 11(6), 1252\u20131264 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"1170_CR49","first-page":"6425583","volume":"2022","author":"RM Sharma","year":"2022","unstructured":"Sharma, R.M., Agrawal, C., Kumar, V., Mulatu, A.N., et al.: Cfsbfdroid: Android malware detection using cfs+ best first search-based feature selection. Mobile Information Systems 2022(1), 6425583 (2022)","journal-title":"Mobile Information Systems"},{"key":"1170_CR50","doi-asserted-by":"crossref","unstructured":"\u015eahin, D.\u00d6., Kural, O.E., Akleylek, S., K\u0131l\u0131\u00e7, E.: A novel android malware detection system: adaption of filter-based feature selection methods. Journal of Ambient Intelligence and Humanized Computing, 1\u201315 (2021)","DOI":"10.1007\/s12652-021-03376-6"},{"key":"1170_CR51","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1016\/j.neucom.2017.07.030","volume":"272","author":"H-J Zhu","year":"2018","unstructured":"Zhu, H.-J., You, Z.-H., Zhu, Z.-X., Shi, W.-L., Chen, X., Cheng, L.: Droiddet: effective and robust detection of android malware using static analysis along with rotation forest model. Neurocomputing 272, 638\u2013646 (2018)","journal-title":"Neurocomputing"},{"key":"1170_CR52","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1016\/j.future.2019.11.034","volume":"105","author":"R Taheri","year":"2020","unstructured":"Taheri, R., Ghahramani, M., Javidan, R., Shojafar, M., Pooranian, Z., Conti, M.: Similarity-based android malware detection using hamming distance of static binary features. Futur. Gener. Comput. Syst. 105, 230\u2013247 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"1170_CR53","doi-asserted-by":"publisher","first-page":"184008","DOI":"10.1109\/ACCESS.2019.2958927","volume":"7","author":"C Li","year":"2019","unstructured":"Li, C., Mills, K., Niu, D., Zhu, R., Zhang, H., Kinawi, H.: Android malware detection based on factorization machine. IEEE Access 7, 184008\u2013184019 (2019)","journal-title":"IEEE Access"},{"issue":"11","key":"1170_CR54","doi-asserted-by":"publisher","first-page":"4772","DOI":"10.3390\/app14114772","volume":"14","author":"\u00d6 Kiraz","year":"2024","unstructured":"Kiraz, \u00d6., Do\u011fru, \u0130A.: Visualising static features and classifying android malware using a convolutional neural network approach. Appl. Sci. 14(11), 4772 (2024)","journal-title":"Appl. Sci."},{"key":"1170_CR55","doi-asserted-by":"publisher","first-page":"1731","DOI":"10.1007\/s12652-020-02243-0","volume":"12","author":"A Amira","year":"2021","unstructured":"Amira, A., Derhab, A., Karbab, E.B., Nouali, O., Khan, F.A.: Tridroid: A triage and classification framework for fast detection of mobile threats in android markets. J. Ambient. Intell. Humaniz. Comput. 12, 1731\u20131755 (2021)","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"1170_CR56","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119593","volume":"218","author":"H Zhu","year":"2023","unstructured":"Zhu, H., Wei, H., Wang, L., Xu, Z., Sheng, V.S.: An effective end-to-end android malware detection method. Expert Syst. Appl. 218, 119593 (2023)","journal-title":"Expert Syst. Appl."},{"key":"1170_CR57","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118705","volume":"212","author":"H-J Zhu","year":"2023","unstructured":"Zhu, H.-J., Gu, W., Wang, L.-M., Xu, Z.-C., Sheng, V.S.: Android malware detection based on multi-head squeeze-and-excitation residual network. Expert Syst. Appl. 212, 118705 (2023)","journal-title":"Expert Syst. Appl."},{"key":"1170_CR58","doi-asserted-by":"crossref","unstructured":"Hu, J., Shen, L., Sun, G.: Squeeze-and-excitation networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 7132\u20137141 (2018)","DOI":"10.1109\/CVPR.2018.00745"},{"key":"1170_CR59","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.123109","volume":"246","author":"T Li","year":"2024","unstructured":"Li, T., Luo, Y., Wan, X., Li, Q., Liu, Q., Wang, R., Jia, C., Xiao, Y.: A malware detection model based on imbalanced heterogeneous graph embeddings. Expert Syst. Appl. 246, 123109 (2024)","journal-title":"Expert Syst. Appl."},{"issue":"6","key":"1170_CR60","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1049\/iet-ifs.2014.0099","volume":"9","author":"SY Yerima","year":"2015","unstructured":"Yerima, S.Y., Sezer, S., Muttik, I.: High accuracy android malware detection using ensemble learning. IET Inf. Secur. 9(6), 313\u2013320 (2015)","journal-title":"IET Inf. Secur."},{"key":"1170_CR61","doi-asserted-by":"publisher","first-page":"148404","DOI":"10.1109\/ACCESS.2020.3007571","volume":"8","author":"H Zhou","year":"2020","unstructured":"Zhou, H., Yang, X., Pan, H., Guo, W.: An android malware detection approach based on simgru. IEEE Access 8, 148404\u2013148410 (2020)","journal-title":"IEEE Access"},{"key":"1170_CR62","doi-asserted-by":"crossref","unstructured":"Cho, K., Merri\u00ebnboer, B., Gulcehre, C., Bahdanau, D., Bougares, F., Schwenk, H., Bengio, Y.: Learning phrase representations using RNN encoder\u2013decoder for statistical machine translation. In: Moschitti, A., Pang, B., Daelemans, W. (eds.) Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 1724\u20131734. Association for Computational Linguistics, Doha, Qatar (2014)","DOI":"10.3115\/v1\/D14-1179"},{"key":"1170_CR63","doi-asserted-by":"crossref","unstructured":"Khariwal, K., Singh, J., Arora, A.: Ipdroid: Android malware detection using intents and permissions. In: 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), pp. 197\u2013202 (2020). IEEE","DOI":"10.1109\/WorldS450073.2020.9210414"},{"issue":"6","key":"1170_CR64","doi-asserted-by":"publisher","first-page":"9517","DOI":"10.1007\/s11042-022-13767-2","volume":"82","author":"MR Keyvanpour","year":"2023","unstructured":"Keyvanpour, M.R., Barani Shirzad, M., Heydarian, F.: Android malware detection applying feature selection techniques and machine learning. Multimedia Tools and Applications 82(6), 9517\u20139531 (2023)","journal-title":"Multimedia Tools and Applications"},{"issue":"2","key":"1170_CR65","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1109\/TCYB.2017.2777960","volume":"49","author":"SY Yerima","year":"2018","unstructured":"Yerima, S.Y., Sezer, S.: Droidfusion: A novel multilevel classifier fusion approach for android malware detection. IEEE transactions on cybernetics 49(2), 453\u2013466 (2018)","journal-title":"IEEE transactions on cybernetics"},{"key":"1170_CR66","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1016\/j.future.2017.01.019","volume":"78","author":"W Wang","year":"2018","unstructured":"Wang, W., Li, Y., Wang, X., Liu, J., Zhang, X.: Detecting android malicious apps and categorizing benign apps with ensemble of classifiers. Futur. Gener. Comput. Syst. 78, 987\u2013994 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"1170_CR67","unstructured":"Zhao, L., Wang, J., Chen, Y., Wu, F., Liu, Y., et al.: Famdroid: learning-based android malware family classification using static analysis. arXiv preprint arXiv:2101.03965 (2021)"},{"issue":"4","key":"1170_CR68","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1049\/cje.2020.00.217","volume":"31","author":"J Yang","year":"2022","unstructured":"Yang, J., Tang, J., Yan, R., Xiang, T.: Android malware detection method based on permission complement and api calls. Chin. J. Electron. 31(4), 773\u2013785 (2022)","journal-title":"Chin. J. Electron."},{"issue":"1","key":"1170_CR69","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1049\/iet-ifs.2013.0095","volume":"8","author":"SY Yerima","year":"2014","unstructured":"Yerima, S.Y., Sezer, S., McWilliams, G.: Analysis of bayesian classification-based approaches for android malware detection. IET Inf. Secur. 8(1), 25\u201336 (2014)","journal-title":"IET Inf. Secur."},{"issue":"1","key":"1170_CR70","first-page":"3284080","volume":"2017","author":"Y Xu","year":"2017","unstructured":"Xu, Y., Wu, C., Zheng, K., Wang, X., Niu, X., Lu, T., et al.: Computing adaptive feature weights with pso to improve android malware detection. Security and Communication Networks 2017(1), 3284080 (2017)","journal-title":"Security and Communication Networks"},{"key":"1170_CR71","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/s11036-019-01248-0","volume":"25","author":"A Mehtab","year":"2020","unstructured":"Mehtab, A., Shahid, W.B., Yaqoob, T., Amjad, M.F., Abbas, H., Afzal, H., Saqib, M.N.: Addroid: rule-based machine learning framework for android malware analysis. Mobile Networks and Applications 25, 180\u2013192 (2020)","journal-title":"Mobile Networks and Applications"},{"key":"1170_CR72","doi-asserted-by":"publisher","first-page":"123208","DOI":"10.1109\/ACCESS.2021.3110408","volume":"9","author":"Y-C Chen","year":"2021","unstructured":"Chen, Y.-C., Chen, H.-Y., Takahashi, T., Sun, B., Lin, T.-N.: Impact of code deobfuscation and feature interaction in android malware detection. IEEE Access 9, 123208\u2013123219 (2021)","journal-title":"IEEE Access"},{"issue":"1","key":"1170_CR73","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/s12065-020-00518-1","volume":"15","author":"A Mahindru","year":"2022","unstructured":"Mahindru, A., Sangal, A.: Somdroid: Android malware detection by artificial neural network trained using unsupervised learning. Evol. Intel. 15(1), 407\u2013437 (2022)","journal-title":"Evol. Intel."},{"issue":"4","key":"1170_CR74","doi-asserted-by":"publisher","first-page":"718","DOI":"10.3390\/sym14040718","volume":"14","author":"F Akbar","year":"2022","unstructured":"Akbar, F., Hussain, M., Mumtaz, R., Riaz, Q., Wahab, A.W.A., Jung, K.-H.: Permissions-based detection of android malware using machine learning. Symmetry 14(4), 718 (2022)","journal-title":"Symmetry"},{"key":"1170_CR75","doi-asserted-by":"crossref","unstructured":"Sivaprakash, P., Sankar, M., Ithayan, J.V., Chithambaramani, R., Charaan, R.D., Marichamy, D.: Autonomous android malware detection system based on static analysis. In: 2024 International Conference on Integration of Emerging Technologies for the Digital World (ICIETDW), pp. 1\u20136 (2024). IEEE","DOI":"10.1109\/ICIETDW61607.2024.10939283"},{"issue":"7553","key":"1170_CR76","first-page":"436","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. nature 521(7553), 436\u2013444 (2015)","journal-title":"Deep learning. nature"},{"issue":"6","key":"1170_CR77","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/479174","volume":"11","author":"H Kang","year":"2015","unstructured":"Kang, H., Jang, J.-W., Mohaisen, A., Kim, H.K.: Detecting and classifying android malware using static analysis along with creator information. Int. J. Distrib. Sens. Netw. 11(6), 479174 (2015)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"1170_CR78","doi-asserted-by":"crossref","unstructured":"Mahdavifar, S., Kadir, A.F.A., Fatemi, R., Alhadidi, D., Ghorbani, A.A.: Dynamic android malware category classification using semi-supervised deep learning. In: 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech), pp. 515\u2013522 (2020). IEEE","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00094"},{"key":"1170_CR79","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10922-021-09634-4","volume":"30","author":"S Mahdavifar","year":"2022","unstructured":"Mahdavifar, S., Alhadidi, D., Ghorbani, A.A.: Effective and efficient hybrid android malware classification using pseudo-label stacked auto-encoder. J. Netw. Syst. Manage. 30, 1\u201334 (2022)","journal-title":"J. Netw. Syst. Manage."},{"key":"1170_CR80","doi-asserted-by":"crossref","unstructured":"Lashkari, A.H., Kadir, A.F.A., Taheri, L., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark android malware datasets and classification. In: 2018 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20137 (2018). IEEE","DOI":"10.1109\/CCST.2018.8585560"},{"key":"1170_CR81","doi-asserted-by":"crossref","unstructured":"Lashkari, A.H., Kadir, A.F.A., Gonzalez, H., Mbah, K.F., Ghorbani, A.A.: Towards a network-based framework for android malware detection and characterization. In: 2017 15th Annual Conference on Privacy, Security and Trust (PST), pp. 233\u201323309 (2017). IEEE","DOI":"10.1109\/PST.2017.00035"},{"key":"1170_CR82","doi-asserted-by":"crossref","unstructured":"Taheri, L., Kadir, A.F.A., Lashkari, A.H.: Extensible android malware detection and family classification using network-flows and api-calls. In: 2019 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20138 (2019). IEEE","DOI":"10.1109\/CCST.2019.8888430"},{"key":"1170_CR83","first-page":"1","volume":"1","author":"B Zhang","year":"2003","unstructured":"Zhang, B., Srihari, S.N.: Properties of binary vector dissimilarity measures. In: Proc. JCIS Int\u2019l Conf. Computer Vision, Pattern Recognition, and Image Processing 1, 1\u20134 (2003)","journal-title":"In: Proc. JCIS Int\u2019l Conf. Computer Vision, Pattern Recognition, and Image Processing"},{"key":"1170_CR84","doi-asserted-by":"crossref","unstructured":"Brusco, M., Cradit, J.D., Steinley, D.: A comparison of 71 binary similarity coefficients: The effect of base rates. PLoS ONE 16(4), 0247751 (2021)","DOI":"10.1371\/journal.pone.0247751"},{"key":"1170_CR85","doi-asserted-by":"crossref","unstructured":"Yule, G.U.: Vii. on the association of attributes in statistics: with illustrations from the material of the childhood society, &c. Philosophical Transactions of the Royal Society of London. Series A, Containing Papers of a Mathematical or Physical Character 194(252\u2013261), 257\u2013319 (1900)","DOI":"10.1098\/rsta.1900.0019"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01170-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01170-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01170-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T17:02:40Z","timestamp":1769878960000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01170-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,22]]},"references-count":85,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["1170"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01170-5","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,22]]},"assertion":[{"value":"28 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"39"}}