{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T05:06:18Z","timestamp":1769922378589,"version":"3.49.0"},"reference-count":157,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T00:00:00Z","timestamp":1766793600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T00:00:00Z","timestamp":1766793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s10207-025-01190-1","type":"journal-article","created":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T14:19:14Z","timestamp":1766845154000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["From code to security: machine learning approaches in android vulnerability detection"],"prefix":"10.1007","volume":"25","author":[{"given":"Kaya Emre","family":"Arikan","sequence":"first","affiliation":[]},{"given":"Sait Melih","family":"Do\u011fan","sequence":"additional","affiliation":[]},{"given":"Ercan Nurcan","family":"Yilmaz","sequence":"additional","affiliation":[]},{"given":"Serkan","family":"G\u00f6nen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,27]]},"reference":[{"issue":"4","key":"1190_CR1","doi-asserted-by":"publisher","first-page":"2753","DOI":"10.1007\/s11277-023-10402-7","volume":"130","author":"SHA Kazmi","year":"2023","unstructured":"Kazmi, S.H.A., Qamar, F., Hassan, R., Nisar, K., Chowdhry, B.S.: Survey on joint paradigm of 5G and SDN emerging mobile technologies: architecture, security, challenges and research directions. Wirel. Pers. Commun. 130(4), 2753\u20132800 (2023). https:\/\/doi.org\/10.1007\/s11277-023-10402-7","journal-title":"Wirel. Pers. Commun."},{"issue":"1","key":"1190_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssaho.2023.100532","volume":"8","author":"AM Al-Ansi","year":"2023","unstructured":"Al-Ansi, A.M., Jaboob, M., Garad, A., Al-Ansi, A.: Analyzing augmented reality (AR) and virtual reality (VR) recent development in education. Soc Sci & Humanit Open 8(1), 100532 (2023). https:\/\/doi.org\/10.1016\/j.ssaho.2023.100532","journal-title":"Soc Sci & Humanit Open"},{"key":"1190_CR3","unstructured":"CVE: Common Vulnerabilities and Exposures: https:\/\/www.cve.org\/about\/overview. Accessed 12 March 2025"},{"key":"1190_CR4","unstructured":"Dowd, M., McDonald, J., Schuh, J.: The art of software security assessment: identifying and preventing software vulnerabilities. Pearson Education (2006)."},{"key":"1190_CR5","doi-asserted-by":"publisher","unstructured":"Pam, N.H.: Detection of recurring software vulnerabilities. In: Proceedings of the 25th IEEE\/ACM International Conference on Automated Software Engineering. https:\/\/dl.acm.org\/doi\/abs\/https:\/\/doi.org\/10.1145\/1858996.1859089. Accessed 12 Mar 2025. [Online].","DOI":"10.1145\/1858996.1859089"},{"key":"1190_CR6","unstructured":"Piessens, F.: A taxonomy of causes of software vulnerabilities in internet software. In: Vouk, M. (ed.), The 13th International Symposium on Software Reliability Engineering, Supplementary Proceedings of the 13th International Symposium on Software Reliability Engineering, pp. 47\u201352. Annapolis, Maryland, USA, November 12\u201315 (2002)"},{"key":"1190_CR7","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.infsof.2017.04.005","volume":"88","author":"R Abdalkareem","year":"2017","unstructured":"Abdalkareem, R., Shihab, E., Rilling, J.: On code reuse from StackOverflow: an exploratory study on Android apps. Inf. Softw. Technol. 88, 148\u2013158 (2017). https:\/\/doi.org\/10.1016\/j.infsof.2017.04.005","journal-title":"Inf. Softw. Technol."},{"key":"1190_CR8","doi-asserted-by":"publisher","unstructured":"Fischer, F., et al.: Stack overflow considered harmful? The Impact of Copy&Paste on Android Application Security. In: 2017 IEEE Symposium on Security and Privacy (SP), May 2017, pp. 121\u2013136. https:\/\/doi.org\/10.1109\/SP.2017.31.","DOI":"10.1109\/SP.2017.31"},{"issue":"7","key":"1190_CR9","doi-asserted-by":"publisher","first-page":"2359","DOI":"10.1109\/TSE.2021.3058985","volume":"48","author":"H Zhang","year":"2022","unstructured":"Zhang, H., Wang, S., Li, H., Chen, T.-H., Hassan, A.E.: A study of C\/C++ code weaknesses on Stack Overflow. IEEE Trans. Softw. Eng. 48(7), 2359\u20132375 (2022). https:\/\/doi.org\/10.1109\/TSE.2021.3058985","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"3","key":"1190_CR10","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1109\/TSE.2008.71","volume":"35","author":"MV M\u00e4ntyl\u00e4","year":"2009","unstructured":"M\u00e4ntyl\u00e4, M.V., Lassenius, C.: What types of defects are really discovered in code reviews? IEEE Trans. Softw. Eng. 35(3), 430\u2013448 (2009). https:\/\/doi.org\/10.1109\/TSE.2008.71","journal-title":"IEEE Trans. Softw. Eng."},{"key":"1190_CR11","doi-asserted-by":"publisher","unstructured":"McQueen, M.A., McQueen, T.A., Boyer, W.F., Chaffin, M.R.: Empirical Estimates and Observations of 0Day Vulnerabilities. In: 2009 42nd Hawaii International Conference on System Sciences, January 2009, pp. 1\u201312. https:\/\/doi.org\/10.1109\/HICSS.2009.186.","DOI":"10.1109\/HICSS.2009.186"},{"key":"1190_CR12","doi-asserted-by":"publisher","unstructured":"Czerwonka, J., Greiler, M., Tilford, J.: Code reviews do not find bugs. How the Current Code Review Best Practice Slows Us Down. In: 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering, May 2015, pp. 27\u201328. https:\/\/doi.org\/10.1109\/ICSE.2015.131.","DOI":"10.1109\/ICSE.2015.131"},{"key":"1190_CR13","unstructured":"Google: List of all products and related security vulnerabilities. https:\/\/www.cvedetails.com\/product-list\/product_type-\/vendor_id-1224\/firstchar-\/page-1\/Google.html. Accessed 12 Mar 2025. [Online]."},{"issue":"1","key":"1190_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/17450101.2022.2072231","volume":"18","author":"A Nikolaeva","year":"2023","unstructured":"Nikolaeva, A., Lin, Y.-T., Nello-Deakin, S., Rubin, O., von Sch\u00f6nfeld, K.C.: Living without commuting: experiences of a less mobile life under COVID-19. Mobilities 18(1), 1\u201320 (2023). https:\/\/doi.org\/10.1080\/17450101.2022.2072231","journal-title":"Mobilities"},{"issue":"13","key":"1190_CR15","doi-asserted-by":"publisher","first-page":"11068","DOI":"10.1109\/JIOT.2023.3235618","volume":"10","author":"Z Wei","year":"2023","unstructured":"Wei, Z., et al.: Integrated sensing and communication signals toward 5G-A and 6G: a survey. IEEE Internet Things J. 10(13), 11068\u201311092 (2023). https:\/\/doi.org\/10.1109\/JIOT.2023.3235618","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"1190_CR16","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1108\/ICS-04-2017-0025","volume":"26","author":"B von Solms","year":"2018","unstructured":"von Solms, B., von Solms, R.: Cybersecurity and information security \u2013 what goes where? Info & Comput Security 26(1), 2\u20139 (2018). https:\/\/doi.org\/10.1108\/ICS-04-2017-0025","journal-title":"Info & Comput Security"},{"key":"1190_CR17","doi-asserted-by":"publisher","unstructured":"Narayanan, A., Chandramohan, M., Chen, L., Liu, Y.: A multi-view context-aware approach to Android malware detection and malicious code localization. Empirical Software Engineering. https:\/\/link.springer.com\/article\/https:\/\/doi.org\/10.1007\/s10664-017-9539-8. Accessed 12 Mar 2025. [Online].","DOI":"10.1007\/s10664-017-9539-8"},{"key":"1190_CR18","unstructured":"Carpenter, P.: Using the Predict, Prevent, Detect, Respond Framework to Communicate Your Security Program Strategy. https:\/\/www.gartner.com\/en\/documents\/3286317. Accessed 12 March 2025. [Online]."},{"key":"1190_CR19","doi-asserted-by":"publisher","unstructured":"Garg, S., Baliyan, N.: Machine learning based android vulnerability detection: a roadmap. In: Kanhere, S., Patil, V.T., Sural, S., Gaur, M.S. (eds.) Information Systems Security, Springer International Publishing, Cham (2020), pp. 87\u201393. https:\/\/doi.org\/10.1007\/978-3-030-65610-2_6.","DOI":"10.1007\/978-3-030-65610-2_6"},{"key":"1190_CR20","doi-asserted-by":"publisher","unstructured":"Lee, J., Babcock, J., Pham, T.S., Bui, T.H.: Myounggu Kang Smart city as a social transition towards inclusive development through technology: a tale of four smart cities. https:\/\/www.tandfonline.com\/doi\/full\/https:\/\/doi.org\/10.1080\/12265934.2022.2074076. Accessed 12 March 2025. [Online].","DOI":"10.1080\/12265934.2022.2074076"},{"key":"1190_CR21","doi-asserted-by":"publisher","unstructured":"Ghaffarian, S.M., Shahriari, H.R.: Software vulnerability analysis and discovery using machine-learning and data-mining techniques: a survey. ACM Comput Survey: 50(4). https:\/\/dl.acm.org\/doi\/abs\/https:\/\/doi.org\/10.1145\/3092566. Accessed 12 March 2025. [Online].","DOI":"10.1145\/3092566"},{"issue":"6","key":"1190_CR22","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12061333","volume":"12","author":"\u00d6 Aslan","year":"2023","unstructured":"Aslan, \u00d6., Aktu\u011f, S.S., Ozkan-Okay, M., Yilmaz, A.A., Akin, E.: A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics 12(6), 6 (2023). https:\/\/doi.org\/10.3390\/electronics12061333","journal-title":"Electronics"},{"key":"1190_CR23","doi-asserted-by":"publisher","first-page":"A5","DOI":"10.1016\/j.jclinepi.2021.04.008","volume":"134","author":"P Tugwell","year":"2021","unstructured":"Tugwell, P., Tovey, D.: PRISMA 2020. J. Clin. Epidemiol. 134, A5\u2013A6 (2021). https:\/\/doi.org\/10.1016\/j.jclinepi.2021.04.008","journal-title":"J. Clin. Epidemiol."},{"key":"1190_CR24","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1016\/j.dib.2018.12.038","volume":"22","author":"S Garg","year":"2018","unstructured":"Garg, S., Baliyan, N.: Data on vulnerability detection in Android. Data Brief 22, 1081\u20131087 (2018). https:\/\/doi.org\/10.1016\/j.dib.2018.12.038","journal-title":"Data Brief"},{"key":"1190_CR25","doi-asserted-by":"publisher","unstructured":"Kapitsaki, G.M.: Examining the Privacy Vulnerability Level of Android Applications. In: 15th International conference on web information systems and technologies. https:\/\/doi.org\/10.5220\/0007955100002366 (2019)","DOI":"10.5220\/0007955100002366"},{"key":"1190_CR26","doi-asserted-by":"publisher","unstructured":"Rathod, J., Bhatti, D.: Building comprehensive dataset: android file and unstructured data collection from APKs for enhanced vulnerability detection. Int. J. Comput. Appl. Technol. Res. (2023). https:\/\/doi.org\/10.7753\/IJCATR1212.1004.","DOI":"10.7753\/IJCATR1212.1004"},{"key":"1190_CR27","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.compeleceng.2019.04.019","volume":"77","author":"S Garg","year":"2019","unstructured":"Garg, S., Baliyan, N.: A novel parallel classifier scheme for vulnerability detection in Android. Comput. Electr. Eng. 77, 12\u201326 (2019). https:\/\/doi.org\/10.1016\/j.compeleceng.2019.04.019","journal-title":"Comput. Electr. Eng."},{"key":"1190_CR28","doi-asserted-by":"publisher","unstructured":"Lochanan, A., Jaysankar, M.R., Subramanian, N.: Permissions based android vulnerability detection and classification based on severity using machine learning. In: Recent Developments in Electronics and Communication Systems, IOS Press, pp. 200\u2013207. https:\/\/doi.org\/10.3233\/ATDE221258 (2023)","DOI":"10.3233\/ATDE221258"},{"issue":"10","key":"1190_CR29","doi-asserted-by":"publisher","first-page":"4181","DOI":"10.1109\/TSE.2021.3114381","volume":"48","author":"X Zhan","year":"2022","unstructured":"Zhan, X., et al.: Research on third-party libraries in Android apps: a taxonomy and systematic literature review. IEEE Trans. Softw. Eng. 48(10), 4181\u20134213 (2022). https:\/\/doi.org\/10.1109\/TSE.2021.3114381","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"2","key":"1190_CR30","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.aci.2016.10.001","volume":"13","author":"X Wei","year":"2017","unstructured":"Wei, X., Wolf, M.: A survey on HTTPS implementation by Android apps: issues and countermeasures. Appl. Comput. Informatics 13(2), 101\u2013117 (2017). https:\/\/doi.org\/10.1016\/j.aci.2016.10.001","journal-title":"Appl. Comput. Informatics"},{"key":"1190_CR31","doi-asserted-by":"publisher","unstructured":"Abdullah, H., Zeebaree, S.R.M.: Android mobile applications vulnerabilities and prevention methods: a review. In: 2021 2nd Information Technology to Enhance e-learning and Other Application (IT-ELA), December 2021, pp. 148\u2013153. https:\/\/doi.org\/10.1109\/IT-ELA52201.2021.9773615.","DOI":"10.1109\/IT-ELA52201.2021.9773615"},{"key":"1190_CR32","unstructured":"Automated security testing of Android applications for secure mobile development. In: IEEE Conference Publication, IEEE Xplore. https:\/\/ieeexplore.ieee.org\/abstract\/document\/9155681. Accessed 12 March 2025. [Online]."},{"issue":"8","key":"1190_CR33","doi-asserted-by":"publisher","DOI":"10.3390\/s150817827","volume":"15","author":"E Casilari","year":"2015","unstructured":"Casilari, E., Luque, R., Mor\u00f3n, M.-J.: Analysis of Android device-based solutions for fall detection. Sensors 15(8), 8 (2015). https:\/\/doi.org\/10.3390\/s150817827","journal-title":"Sensors"},{"key":"1190_CR34","doi-asserted-by":"publisher","unstructured":"Secure coding practices in Java. In: Proceedings of the 40th International Conference on Software Engineering. https:\/\/dl.acm.org\/doi\/abs\/https:\/\/doi.org\/10.1145\/3180155.3180201. Accessed: 12 March 2025. [Online].","DOI":"10.1145\/3180155.3180201"},{"key":"1190_CR35","unstructured":"Definition of ARTIFICIAL INTELLIGENCE. https:\/\/www.merriam-webster.com\/dictionary\/artificial+intelligence. Accessed 25 March 2025. [Online]."},{"key":"1190_CR36","unstructured":"Mitchell, T.M.: Machine Learning. McGraw-Hill (1997)."},{"key":"1190_CR37","doi-asserted-by":"crossref","unstructured":"Kelleher, J.D.: Deep Learning. MIT Press (2019).","DOI":"10.7551\/mitpress\/11171.001.0001"},{"key":"1190_CR38","doi-asserted-by":"crossref","unstructured":"Explainable Artificial Intelligence. DARPA. https:\/\/www.darpa.mil\/research\/programs\/explainable-artificial-intelligence. Accessed 25 March 2025. [Online].","DOI":"10.1201\/9781003502432-2"},{"key":"1190_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102087","volume":"100","author":"S Garg","year":"2021","unstructured":"Garg, S., Baliyan, N.: Android security assessment: a review, taxonomy and research gap study. Comput. Secur. 100, 102087 (2021). https:\/\/doi.org\/10.1016\/j.cose.2020.102087","journal-title":"Comput. Secur."},{"key":"1190_CR40","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.infsof.2017.04.001","volume":"88","author":"L Li","year":"2017","unstructured":"Li, L., et al.: Static analysis of android apps: a systematic literature review. Inf. Softw. Technol. 88, 67\u201395 (2017). https:\/\/doi.org\/10.1016\/j.infsof.2017.04.001","journal-title":"Inf. Softw. Technol."},{"key":"1190_CR41","doi-asserted-by":"publisher","unstructured":"Vall\u00e9e-Rai, R., Co, P., Gagnon, E., Hendren, L., Lam, P., Sundaresan, V.: Soot: a Java bytecode optimization framework. In: CASCON First Decade High Impact Papers, in CASCON \u201910. USA, IBM Corp., November 2010, pp. 214\u2013224. https:\/\/doi.org\/10.1145\/1925805.1925818.","DOI":"10.1145\/1925805.1925818"},{"key":"1190_CR42","unstructured":"Vall\u00e9e-Rai, R., Hendren, L.J.: Jimple: Simplifying Java Bytecode for Analyses and Transformations, Request PDF. https:\/\/www.researchgate.net\/publication\/243776080_Jimple_Simplifying_Java_Bytecode_for_Analyses_and_Transformations. Accessed 12 March 2025. [Online]."},{"issue":"9","key":"1190_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3556974","volume":"55","author":"J Senanayake","year":"2023","unstructured":"Senanayake, J., Kalutarage, H., Al-Kadri, M.O., Petrovski, A., Piras, L.: Android source code vulnerability detection: a systematic literature review. ACM Comput. Surv. 55(9), 1\u201337 (2023). https:\/\/doi.org\/10.1145\/3556974","journal-title":"ACM Comput. Surv."},{"key":"1190_CR44","doi-asserted-by":"publisher","unstructured":"Sharma, T. et al.: A Survey on Machine Learning Techniques for Source Code Analysis, 13 September, arXiv: arXiv:2110.09610. https:\/\/doi.org\/10.48550\/arXiv.2110.09610 (2022)","DOI":"10.48550\/arXiv.2110.09610"},{"issue":"1","key":"1190_CR45","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/s11036-019-01248-0","volume":"25","author":"A Mehtab","year":"2020","unstructured":"Mehtab, A., et al.: AdDroid: rule-based machine learning framework for Android malware analysis. Mob. Networks Appl. 25(1), 180\u2013192 (2020). https:\/\/doi.org\/10.1007\/s11036-019-01248-0","journal-title":"Mob. Networks Appl."},{"issue":"1","key":"1190_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10844-020-00598-6","volume":"55","author":"A Appice","year":"2020","unstructured":"Appice, A., Andresini, G., Malerba, D.: Clustering-aided multi-view classification: a case study on Android malware detection. J. Intell. Inf. Syst. 55(1), 1\u201326 (2020). https:\/\/doi.org\/10.1007\/s10844-020-00598-6","journal-title":"J. Intell. Inf. Syst."},{"key":"1190_CR47","doi-asserted-by":"publisher","unstructured":"Liu, X., Zhang, J., Lin, Y., Li, H.: ATMPA: attacking machine learning-based malware visualization detection methods via adversarial examples. In: Proceedings of the International Symposium on Quality of Service, in IWQoS \u201919. New York, NY, USA, June 2019. Association for Computing Machinery, pp. 1\u201310. https:\/\/doi.org\/10.1145\/3326285.3329073.","DOI":"10.1145\/3326285.3329073"},{"issue":"1","key":"1190_CR48","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/TST.2016.7399288","volume":"21","author":"Z Yuan","year":"2016","unstructured":"Yuan, Z., Lu, Y., Xue, Y.: Droiddetector: android malware characterization and detection using deep learning. Tsinghua Sci. Technol. 21(1), 114\u2013123 (2016). https:\/\/doi.org\/10.1109\/TST.2016.7399288","journal-title":"Tsinghua Sci. Technol."},{"key":"1190_CR49","unstructured":"Wang, R., et al.: {EASEAndroid}: Automatic Policy Analysis and Refinement for Security Enhanced Android via {Large-Scale} {Semi-Supervised} Learning. In: Presented at the 24th USENIX Security Symposium (USENIX Security 15), pp. 351\u2013366. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/wang-ruowen (2015). Accessed 13 March 2025. [Online]."},{"key":"1190_CR50","doi-asserted-by":"publisher","unstructured":"Fadadu, F., Handa, A., Kumar, N., Shukla, S.K.: Evading API call sequence based malware classifiers. In: Zhou, J., Luo, X., Shen, Q., Xu, Z. (eds.) Information and Communications Security, Springer International Publishing, Cham, pp. 18\u201333. https:\/\/doi.org\/10.1007\/978-3-030-41579-2_2 (2020)","DOI":"10.1007\/978-3-030-41579-2_2"},{"key":"1190_CR51","doi-asserted-by":"publisher","unstructured":"Han, H., Lim, S., Suh, K., Park, S., Cho, S., Park, M.: Enhanced android malware detection: an svm-based machine learning approach. In: 2020 IEEE International Conference on Big Data and Smart Computing (BigComp), February 2020, pp. 75\u201381. https:\/\/doi.org\/10.1109\/BigComp48618.2020.00-96 (2020)","DOI":"10.1109\/BigComp48618.2020.00-96"},{"key":"1190_CR52","doi-asserted-by":"publisher","unstructured":"Mahindru, A., Sangal, A.L.: Feature-based semi-supervised learning to detect malware from android. In: Satapathy, S.C., Jena, A.K., Singh, J., Bilgaiyan, S. (eds.) Automated Software Engineering: A Deep Learning-Based Approach, Springer International Publishing, Cham, pp. 93\u2013118. https:\/\/doi.org\/10.1007\/978-3-030-38006-9_6 (2020)","DOI":"10.1007\/978-3-030-38006-9_6"},{"key":"1190_CR53","doi-asserted-by":"publisher","unstructured":"Mantoo, B.A., Khurana, S.S.: Static, dynamic and intrinsic features based android malware detection using machine learning. In: Singh, P.K., Kar, A.K., Singh, Y., Kolekar, M.H., Tanwar, S. (eds.) Proceedings of ICRIC 2019, Springer International Publishing, Cham, pp. 31\u201345. https:\/\/doi.org\/10.1007\/978-3-030-29407-6_4 (2020)","DOI":"10.1007\/978-3-030-29407-6_4"},{"key":"1190_CR54","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.future.2019.03.006","volume":"97","author":"I Mart\u00edn","year":"2019","unstructured":"Mart\u00edn, I., Hern\u00e1ndez, J.A., de los Santos, S.: Machine-learning based analysis and classification of Android malware signatures. Future Gener. Comput. Syst. 97, 295\u2013305 (2019). https:\/\/doi.org\/10.1016\/j.future.2019.03.006","journal-title":"Future Gener. Comput. Syst."},{"key":"1190_CR55","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101573","volume":"87","author":"L Nguyen-Vu","year":"2019","unstructured":"Nguyen-Vu, L., Ahn, J., Jung, S.: Android fragmentation in malware detection. Comput. Secur. 87, 101573 (2019). https:\/\/doi.org\/10.1016\/j.cose.2019.101573","journal-title":"Comput. Secur."},{"key":"1190_CR56","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106089","volume":"89","author":"S Sharmeen","year":"2020","unstructured":"Sharmeen, S., Huda, S., Abawajy, J., Hassan, M.M.: An adaptive framework against android privilege escalation threats using deep learning and semi-supervised approaches. Appl. Soft Comput. 89, 106089 (2020). https:\/\/doi.org\/10.1016\/j.asoc.2020.106089","journal-title":"Appl. Soft Comput."},{"key":"1190_CR57","doi-asserted-by":"publisher","unstructured":"Pang, Y., Xue, X., Wang, H.: Predicting vulnerable software components through deep neural network. In: Proceedings of the 2017 International Conference on Deep Learning Technologies, in ICDLT \u201917. New York, NY, USA, June 2017. Association for Computing Machinery, pp. 6\u201310. https:\/\/doi.org\/10.1145\/3094243.3094245 (2017)","DOI":"10.1145\/3094243.3094245"},{"key":"1190_CR58","doi-asserted-by":"publisher","unstructured":"Wu, F., Wang, J., Liu, J., Wang, W.: Vulnerability detection with deep learning. In: 2017 3rd IEEE International Conference on Computer and Communications (ICCC), December 2017, pp. 1298\u20131302. https:\/\/doi.org\/10.1109\/CompComm.2017.8322752 (2017)","DOI":"10.1109\/CompComm.2017.8322752"},{"key":"1190_CR59","doi-asserted-by":"publisher","unstructured":"Zhuo, L., Zhimin, G., Cen, C.: Research on android intent security detection based on machine learning. In: 2017 4th International Conference on Information Science and Control Engineering (ICISCE), July 2017, pp. 569\u2013574. https:\/\/doi.org\/10.1109\/ICISCE.2017.124 (2017)","DOI":"10.1109\/ICISCE.2017.124"},{"key":"1190_CR60","doi-asserted-by":"publisher","first-page":"150672","DOI":"10.1109\/ACCESS.2020.3016774","volume":"8","author":"Z Bilgin","year":"2020","unstructured":"Bilgin, Z., Ersoy, M.A., Soykan, E.U., Tomur, E., \u00c7omak, P., Kara\u00e7ay, L.: Vulnerability prediction from source code using machine learning. IEEE Access 8, 150672\u2013150684 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3016774","journal-title":"IEEE Access"},{"issue":"1","key":"1190_CR61","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s13198-020-01036-0","volume":"12","author":"A Gupta","year":"2021","unstructured":"Gupta, A., Suri, B., Kumar, V., Jain, P.: Extracting rules for vulnerabilities detection with static metrics using machine learning. Int. J. Syst. Assur. Eng. Manag. 12(1), 65\u201376 (2021). https:\/\/doi.org\/10.1007\/s13198-020-01036-0","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"issue":"1","key":"1190_CR62","doi-asserted-by":"publisher","DOI":"10.3390\/sym13010035","volume":"13","author":"S Kim","year":"2021","unstructured":"Kim, S., Yeom, S., Oh, H., Shin, D., Shin, D.: Automatic malicious code classification system through static analysis using machine learning. Symmetry 13(1), 1 (2021). https:\/\/doi.org\/10.3390\/sym13010035","journal-title":"Symmetry"},{"issue":"1","key":"1190_CR63","doi-asserted-by":"publisher","first-page":"454","DOI":"10.3837\/tiis.2018.01.022","volume":"12","author":"L Shiqi","year":"2018","unstructured":"Shiqi, L., Shengwei, T., Long, Y., Jiong, Y., Hua, S.: Android malicious code classification using deep belief network. KSII Trans. Internet Inf. Syst. 12(1), 454\u2013475 (2018). https:\/\/doi.org\/10.3837\/tiis.2018.01.022","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"1190_CR64","doi-asserted-by":"publisher","unstructured":"Ali Alatwi, H., Oh, T., Fokoue, E., Stackpole, B.: Android malware detection using category-based machine learning classifiers. In: Proceedings of the 17th Annual Conference on Information Technology Education, in SIGITE \u201916. New York, NY, USA, September 2016. Association for Computing Machinery, pp. 54\u201359. https:\/\/doi.org\/10.1145\/2978192.2978218 (2016)","DOI":"10.1145\/2978192.2978218"},{"key":"1190_CR65","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.comcom.2020.02.078","volume":"155","author":"J Cui","year":"2020","unstructured":"Cui, J., Wang, L., Zhao, X., Zhang, H.: Towards predictive analysis of android vulnerability using statistical codes and machine learning for IoT applications. Comput. Commun. 155, 125\u2013131 (2020). https:\/\/doi.org\/10.1016\/j.comcom.2020.02.078","journal-title":"Comput. Commun."},{"issue":"5","key":"1190_CR66","doi-asserted-by":"publisher","first-page":"205","DOI":"10.14257\/ijsia.2015.9.5.21","volume":"9","author":"Y Li","year":"2015","unstructured":"Li, Y., Ma, R., Jiao, R.: A hybrid malicious code detection method based on deep learning. Int. J. Secur. Appl. 9(5), 205\u2013216 (2015). https:\/\/doi.org\/10.14257\/ijsia.2015.9.5.21","journal-title":"Int. J. Secur. Appl."},{"key":"1190_CR67","doi-asserted-by":"publisher","unstructured":"Lin, G., Xiao, W., Zhang, J., Xiang, Y.: Deep learning-based vulnerable function detection: a benchmark. In: Zhou, J., Luo, X., Shen, Q., Xu, Z. (eds.) Information and Communications Security, pp. 219\u2013232. Springer International Publishing, Cham (2020), https:\/\/doi.org\/10.1007\/978-3-030-41579-2_13.","DOI":"10.1007\/978-3-030-41579-2_13"},{"key":"1190_CR68","doi-asserted-by":"publisher","unstructured":"Krutz, D.E., et al.: A dataset of open-source android applications. In: 2015 IEEE\/ACM 12th Working Conference on Mining Software Repositories, May 2015, pp. 522\u2013525. https:\/\/doi.org\/10.1109\/MSR.2015.79.","DOI":"10.1109\/MSR.2015.79"},{"key":"1190_CR69","doi-asserted-by":"publisher","unstructured":"Rahman, A., Pradhan, P., Partho, A., Williams, L.: Predicting android application security and privacy risk with static code metrics. In: 2017 IEEE\/ACM 4th International Conference on Mobile Software Engineering and Systems (MOBILESoft), May 2017, pp. 149\u2013153. https:\/\/doi.org\/10.1109\/MOBILESoft.2017.14.","DOI":"10.1109\/MOBILESoft.2017.14"},{"key":"1190_CR70","doi-asserted-by":"publisher","unstructured":"Piskachev, G., Do, L.N.Q., Bodden, E.: Codebase-adaptive detection of security-relevant methods. In: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, in ISSTA 2019. New York, NY, USA: Association for Computing Machinery, July 2019, pp. 181\u2013191. https:\/\/doi.org\/10.1145\/3293882.3330556.","DOI":"10.1145\/3293882.3330556"},{"key":"1190_CR71","doi-asserted-by":"publisher","unstructured":"Malik, Y., Campos, C.R.S., Jaafar, F.: Detecting android security vulnerabilities using machine learning and system calls analysis. In: 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C), July 2019, pp. 109\u2013113. https:\/\/doi.org\/10.1109\/QRS-C.2019.00033.","DOI":"10.1109\/QRS-C.2019.00033"},{"key":"1190_CR72","doi-asserted-by":"publisher","unstructured":"Senanayake, J., Kalutarage, H., Al-Kadri, M.O., Piras, L., Petrovski, A.: Labelled Vulnerability Dataset on Android Source Code (LVDAndro) to develop AI-Based code vulnerability detection models. In: Presented at the 20th International Conference on Security and Cryptography, September 2024, pp. 659\u2013666. https:\/\/www.scitepress.org\/Link.aspx?doi=https:\/\/doi.org\/10.5220\/0012060400003555. Accessed 19 September 2024. [Online].","DOI":"10.5220\/0012060400003555"},{"key":"1190_CR73","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103741","volume":"82","author":"J Senanayake","year":"2024","unstructured":"Senanayake, J., Kalutarage, H., Petrovski, A., Piras, L., Al-Kadri, M.O.: Defendroid: real-time Android code vulnerability detection via blockchain federated neural network with XAI. J. Inf. Secur. Appl. 82, 103741 (2024). https:\/\/doi.org\/10.1016\/j.jisa.2024.103741","journal-title":"J. Inf. Secur. Appl."},{"key":"1190_CR74","doi-asserted-by":"publisher","unstructured":"Mathews, N.S., Brus, Y., Aafer, Y., Nagappan, M., McIntosh, S.: LLbezpeky: leveraging large language models for vulnerability detection, 13 February 2024. arXiv: arXiv:2401.01269. https:\/\/doi.org\/10.48550\/arXiv.2401.01269.","DOI":"10.48550\/arXiv.2401.01269"},{"key":"1190_CR75","doi-asserted-by":"publisher","unstructured":"Mitra, J., Ranganath, V.-P.: Ghera: a repository of android app vulnerability benchmarks. In: Proceedings of the 13th International Conference on Predictive Models and Data Analytics in Software Engineering, in PROMISE. New York, NY, USA: Association for Computing Machinery, November 2017, pp. 43\u201352. https:\/\/doi.org\/10.1145\/3127005.3127010.","DOI":"10.1145\/3127005.3127010"},{"key":"1190_CR76","doi-asserted-by":"publisher","unstructured":"Senanayake, J., Kalutarage, H., Al-Kadri, M.O., Petrovski, A., Piras, L.: Android code vulnerabilities early detection using AI-Powered ACVED plugin. In: Atluri, V., Ferrara, A.L. (eds.) Data and applications security and privacy XXXVII, pp. 339\u2013357. Springer Nature Switzerland, Cham (2023) https:\/\/doi.org\/10.1007\/978-3-031-37586-6_20.","DOI":"10.1007\/978-3-031-37586-6_20"},{"key":"1190_CR77","doi-asserted-by":"publisher","unstructured":"Yim, K.S.: Predicting likely-vulnerable code changes: machine learning-based vulnerability protections for android open source project. 26 May 2024, arXiv: arXiv:2405.16655. https:\/\/doi.org\/10.48550\/arXiv.2405.16655.","DOI":"10.48550\/arXiv.2405.16655"},{"key":"1190_CR78","unstructured":"Android Open Source Project. Android Open Source Project. https:\/\/source.android.com\/(2025) Accessed 14 March 2025. [Online]."},{"key":"1190_CR79","doi-asserted-by":"publisher","unstructured":"Senanayake, J., Kalutarage, H., Petrovski, A., Al-Kadri, M.O., Piras, L.: FedREVAN: Real-time DEtection of\u00a0Vulnerable Android Source Code Through Federated Neural Network with\u00a0XAI. In: Katsikas, S., Abie, H., Ranise, S., Verderame, L., Cambiaso, E., Ugarelli, R., Pra\u00e7a, I., Li, W., Meng, W., Furnell, S., Katt, B., Pirbhulal, S., Shukla, A., Ianni, M., Dalla Preda, M., Choo, K.-K. R., Pupo Correia, M., Abhishta, A., Sileno, G., Alishahi, M., Kalutarage, H., Yanai, N. (eds.) Computer Security. ESORICS 2023 International Workshops, pp. 426\u2013441. Springer Nature Switzerland, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-54129-2_25.","DOI":"10.1007\/978-3-031-54129-2_25"},{"key":"1190_CR80","doi-asserted-by":"publisher","unstructured":"Nasteski, V.: An overview of the supervised machine learning methods. In: ResearchGate, December 2024, https:\/\/doi.org\/10.20544\/HORIZONS.B.04.1.17.P05.","DOI":"10.20544\/HORIZONS.B.04.1.17.P05"},{"key":"1190_CR81","doi-asserted-by":"publisher","unstructured":"Ma, S., Thung, F., Lo, D., Sun, C., Deng, R.H.: VuRLE: automatic vulnerability detection and repair by learning from examples. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) Computer security\u2014ESORICS 2017, pp. 229\u2013246. Springer International Publishing, Cham (2017), https:\/\/doi.org\/10.1007\/978-3-319-66399-9_13.","DOI":"10.1007\/978-3-319-66399-9_13"},{"issue":"2","key":"1190_CR82","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3376121","volume":"1","author":"J Gajrani","year":"2020","unstructured":"Gajrani, J., Tripathi, M., Laxmi, V., Somani, G., Zemmari, A., Gaur, M.S.: Vulvet: vetting of vulnerabilities in Android apps to thwart exploitation. Digit. Threats 1(2), 1\u201325 (2020). https:\/\/doi.org\/10.1145\/3376121","journal-title":"Digit. Threats"},{"key":"1190_CR83","doi-asserted-by":"publisher","unstructured":"Senanayake, J., Kalutarage, H., Al-Kadri, M.O., Petrovski, A., Piras, L.: Developing secured android applications by mitigating code vulnerabilities with machine learning. In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, in ASIA CCS \u201922. New York, NY, USA: Association for Computing Machinery, May 2022, pp. 1255\u20131257. https:\/\/doi.org\/10.1145\/3488932.3527290 (2022)","DOI":"10.1145\/3488932.3527290"},{"key":"1190_CR84","doi-asserted-by":"publisher","unstructured":"LaMalva, G., Schmeelk, S.: MobSF: Mobile Health Care Android Applications Through The Lens of Open Source Static Analysis. In: 2020 IEEE MIT Undergraduate Research Technology Conference (URTC), October 2020, pp. 1\u20134. https:\/\/doi.org\/10.1109\/URTC51696.2020.9668870.","DOI":"10.1109\/URTC51696.2020.9668870"},{"key":"1190_CR85","doi-asserted-by":"publisher","unstructured":"Kulkarni, K., Javaid, A.Y.: Open source android vulnerability detection tools: a survey, 31 July 2018, arXiv: arXiv:1807.11840. https:\/\/doi.org\/10.48550\/arXiv.1807.11840 (2018)","DOI":"10.48550\/arXiv.1807.11840"},{"issue":"1","key":"1190_CR86","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/s10664-019-09749-y","volume":"25","author":"V-P Ranganath","year":"2020","unstructured":"Ranganath, V.-P., Mitra, J.: Are free Android app security analysis tools effective in detecting known vulnerabilities? Empir. Softw. Eng. 25(1), 178\u2013219 (2020). https:\/\/doi.org\/10.1007\/s10664-019-09749-y","journal-title":"Empir. Softw. Eng."},{"key":"1190_CR87","doi-asserted-by":"publisher","unstructured":"Noever, D.: Can large language models find and fix vulnerable software?. 20 August 2023, arXiv: arXiv:2308.10345. https:\/\/doi.org\/10.48550\/arXiv.2308.10345 (2023)","DOI":"10.48550\/arXiv.2308.10345"},{"key":"1190_CR88","doi-asserted-by":"publisher","unstructured":"Kouliaridis, V., Karopoulos, G., Kambourakis, G.: Assessing the effectiveness of LLMs in android application vulnerability analysis, 27 June 2024, arXiv: arXiv:2406.18894. https:\/\/doi.org\/10.48550\/arXiv.2406.18894 (2024)","DOI":"10.48550\/arXiv.2406.18894"},{"issue":"10","key":"1190_CR89","doi-asserted-by":"publisher","DOI":"10.3390\/info10100326","volume":"10","author":"A Amin","year":"2019","unstructured":"Amin, A., Eldessouki, A., Magdy, M.T., Abdeen, N., Hindy, H., Hegazy, I.: AndroShield: automated Android applications vulnerability detection, a hybrid static and dynamic analysis approach. Information 10(10), 10 (2019). https:\/\/doi.org\/10.3390\/info10100326","journal-title":"Information"},{"issue":"12","key":"1190_CR90","doi-asserted-by":"publisher","first-page":"3385","DOI":"10.1109\/TSE.2024.3488041","volume":"50","author":"J Zhu","year":"2024","unstructured":"Zhu, J., Li, K., Chen, S., Fan, L., Wang, J., Xie, X.: A comprehensive study on static application security testing (SAST) tools for Android. IEEE Trans. Softw. Eng. 50(12), 3385\u20133402 (2024). https:\/\/doi.org\/10.1109\/TSE.2024.3488041","journal-title":"IEEE Trans. Softw. Eng."},{"key":"1190_CR91","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2021.100515","volume":"30","author":"K Gencer","year":"2021","unstructured":"Gencer, K., Ba\u015f\u00e7ift\u00e7i, F.: Time series forecast modeling of vulnerabilities in the android operating system using ARIMA and deep learning methods. Sustain. Comput. Inform. Syst. 30, 100515 (2021). https:\/\/doi.org\/10.1016\/j.suscom.2021.100515","journal-title":"Sustain. Comput. Inform. Syst."},{"issue":"4","key":"1190_CR92","doi-asserted-by":"publisher","first-page":"2507","DOI":"10.1109\/TDSC.2023.3308897","volume":"21","author":"Q Zhang","year":"2024","unstructured":"Zhang, Q., Fang, C., Yu, B., Sun, W., Zhang, T., Chen, Z.: Pre-trained model-based automated software vulnerability repair: how far are we? IEEE Trans. Dependable Secur. Comput. 21(4), 2507\u20132525 (2024). https:\/\/doi.org\/10.1109\/TDSC.2023.3308897","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"6","key":"1190_CR93","doi-asserted-by":"publisher","DOI":"10.3390\/sym13061081","volume":"13","author":"C Wang","year":"2021","unstructured":"Wang, C., Zhang, L., Zhao, K., Ding, X., Wang, X.: AdvAndMal: adversarial training for Android malware detection and family classification. Symmetry 13(6), 6 (2021). https:\/\/doi.org\/10.3390\/sym13061081","journal-title":"Symmetry"},{"issue":"6","key":"1190_CR94","doi-asserted-by":"publisher","first-page":"1040","DOI":"10.1016\/j.dcan.2021.11.001","volume":"8","author":"N Bala","year":"2022","unstructured":"Bala, N., Ahmar, A., Li, W., Tovar, F., Battu, A., Bambarkar, P.: DroidEnemy: battling adversarial example attacks for Android malware detection. Digit. Commun. Networks 8(6), 1040\u20131047 (2022). https:\/\/doi.org\/10.1016\/j.dcan.2021.11.001","journal-title":"Digit. Commun. Networks"},{"key":"1190_CR95","doi-asserted-by":"publisher","DOI":"10.1016\/j.softx.2022.100977","volume":"18","author":"G Renjith","year":"2022","unstructured":"Renjith, G., Laudanna, S., Aji, S., Visaggio, C.A., Vinod, P.: GANG-MAM: GAN based engine for modifying Android malware. SoftwareX 18, 100977 (2022). https:\/\/doi.org\/10.1016\/j.softx.2022.100977","journal-title":"SoftwareX"},{"key":"1190_CR96","doi-asserted-by":"publisher","unstructured":"Rathore, H., Nikam, P., Sahay, S.K., Sewak, M.: Identification of adversarial android intents using reinforcement learning. In: 2021 International Joint Conference on Neural Networks (IJCNN), July 2021, pp. 1\u20138. https:\/\/doi.org\/10.1109\/IJCNN52387.2021.9534142.","DOI":"10.1109\/IJCNN52387.2021.9534142"},{"key":"1190_CR97","doi-asserted-by":"publisher","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy, May 2012, pp. 95\u2013109. https:\/\/doi.org\/10.1109\/SP.2012.16.","DOI":"10.1109\/SP.2012.16"},{"key":"1190_CR98","doi-asserted-by":"publisher","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K.: (PDF) DREBIN: effective and explainable detection of android malware in your pocket, In: ResearchGate, https:\/\/doi.org\/10.14722\/ndss.2014.23247.","DOI":"10.14722\/ndss.2014.23247"},{"issue":"15","key":"1190_CR99","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12153253","volume":"12","author":"A G\u00f3mez","year":"2023","unstructured":"G\u00f3mez, A., Mu\u00f1oz, A.: Deep learning-based attack detection and classification in Android devices. Electronics 12(15), 15 (2023). https:\/\/doi.org\/10.3390\/electronics12153253","journal-title":"Electronics"},{"issue":"1","key":"1190_CR100","doi-asserted-by":"publisher","first-page":"651","DOI":"10.32604\/cmc.2024.047530","volume":"79","author":"A Wajahat","year":"2024","unstructured":"Wajahat, A., et al.: Outsmarting Android malware with cutting-edge feature engineering and machine learning techniques. Comput. Mater. Contin. 79(1), 651\u2013673 (2024). https:\/\/doi.org\/10.32604\/cmc.2024.047530","journal-title":"Comput. Mater. Contin."},{"issue":"2","key":"1190_CR101","doi-asserted-by":"publisher","first-page":"998","DOI":"10.1109\/COMST.2014.2386139","volume":"17","author":"P Faruki","year":"2015","unstructured":"Faruki, P., et al.: Android security: a survey of issues, malware penetration, and defenses. IEEE Commun. Surv. Tutor. 17(2), 998\u20131022 (2015). https:\/\/doi.org\/10.1109\/COMST.2014.2386139","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"4","key":"1190_CR102","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3017427","volume":"49","author":"K Tam","year":"2017","unstructured":"Tam, K., Feizollah, A., Anuar, N.B., Salleh, R., Cavallaro, L.: The evolution of Android malware and Android analysis techniques. ACM Comput. Surv. 49(4), 1\u201341 (2017). https:\/\/doi.org\/10.1145\/3017427","journal-title":"ACM Comput. Surv."},{"issue":"21","key":"1190_CR103","doi-asserted-by":"publisher","DOI":"10.3390\/app132111908","volume":"13","author":"NK Gyamfi","year":"2023","unstructured":"Gyamfi, N.K., Goranin, N., Ceponis, D., \u010cenys, H.A.: Automated system-level malware detection using machine learning: a comprehensive review. Appl. Sci. 13(21), 21 (2023). https:\/\/doi.org\/10.3390\/app132111908","journal-title":"Appl. Sci."},{"key":"1190_CR104","doi-asserted-by":"publisher","unstructured":"Pauck, F., Bodden, E., Wehrheim, H.: Do Android taint analysis tools keep their promises? In: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, in ESEC\/FSE 2018. Association for Computing Machinery, Oct. 2018, pp. 331\u2013341. New York, NY, USA. https:\/\/doi.org\/10.1145\/3236024.3236029.","DOI":"10.1145\/3236024.3236029"},{"key":"1190_CR105","doi-asserted-by":"publisher","unstructured":"Wei, F., Roy, S., Ou, X., Robby.: Amandroid: a precise and general inter-component data flow analysis framework for security vetting of android apps. ACM Trans. Priv. Secur. 21(3), 1\u201332 (2018). https:\/\/doi.org\/10.1145\/3183575.","DOI":"10.1145\/3183575"},{"key":"1190_CR106","doi-asserted-by":"publisher","unstructured":"Bosu, A., Liu, F., Wang, G.: Android Collusive Data Leaks with Flow-sensitive DIALDroid Dataset. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 71\u201385. ACM, Abu Dhabi United Arab Emirates (2017). https:\/\/doi.org\/10.1145\/3052973.3053004","DOI":"10.1145\/3052973.3053004"},{"key":"1190_CR107","doi-asserted-by":"publisher","unstructured":"Klieber, W., Flynn, L., Bhosale, A., Jia, L., Bauer, L.: Android taint flow analysis for app sets. In: Proceedings of the 3rd ACM SIGPLAN International Workshop on the State of the Art in Java Program Analysis, Edinburgh United Kingdom: ACM, June 2014, pp. 1\u20136. https:\/\/doi.org\/10.1145\/2614628.2614633.","DOI":"10.1145\/2614628.2614633"},{"issue":"6","key":"1190_CR108","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1145\/2666356.2594299","volume":"49","author":"S Arzt","year":"2014","unstructured":"Arzt, S., et al.: FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps. SIGPLAN Not. 49(6), 259\u2013269 (2014). https:\/\/doi.org\/10.1145\/2666356.2594299","journal-title":"SIGPLAN Not."},{"key":"1190_CR109","doi-asserted-by":"publisher","unstructured":"Rasthofer, S., Arzt, S., Bodden, E.: A machine-learning approach for classifying and categorizing android sources and sinks. In: Proceedings 2014 Network and Distributed System Security Symposium, Internet Society, San Diego, CA. https:\/\/doi.org\/10.14722\/ndss.2014.23039 (2014)","DOI":"10.14722\/ndss.2014.23039"},{"key":"1190_CR110","doi-asserted-by":"publisher","unstructured":"Sas, D., Bessi, M., Arcelli Fontana, F.: Automatic Detection of Sources and Sinks in Arbitrary Java Libraries. In: 2018 IEEE 18th International Working Conference on Source Code Analysis and Manipulation (SCAM), September 2018, pp. 103\u2013112. https:\/\/doi.org\/10.1109\/SCAM.2018.00019 (2018)","DOI":"10.1109\/SCAM.2018.00019"},{"key":"1190_CR111","doi-asserted-by":"publisher","unstructured":"Chen, S., Zhang, Y., Fan, L., Li, J., Liu, Y.: AUSERA: Automated Security Vulnerability Detection for Android Apps. In: Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering, in ASE \u201922. New York, NY, USA: Association for Computing Machinery, January 2023, pp. 1\u20135. https:\/\/doi.org\/10.1145\/3551349.3559524 (2023)","DOI":"10.1145\/3551349.3559524"},{"issue":"2","key":"1190_CR112","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1162\/daed_a_01905","volume":"151","author":"CD Manning","year":"2022","unstructured":"Manning, C.D.: Human language understanding & reasoning. Daedalus 151(2), 127\u2013138 (2022). https:\/\/doi.org\/10.1162\/daed_a_01905","journal-title":"Daedalus"},{"key":"1190_CR113","doi-asserted-by":"publisher","unstructured":"Hou, X., et al.: Large language models for software engineering: a systematic literature review, ACM Trans Softw Eng Methodol, December 2024, vol. 33, no. 8, pp. 1\u201379. https:\/\/doi.org\/10.1145\/3695988 (2024)","DOI":"10.1145\/3695988"},{"key":"1190_CR114","doi-asserted-by":"publisher","unstructured":"Cheshkov, A., Zadorozhny, P., Levichev, R.: Evaluation of ChatGPT Model for Vulnerability Detection, 12 April 2023, arXiv: arXiv:2304.07232. https:\/\/doi.org\/10.48550\/arXiv.2304.07232 (2023)","DOI":"10.48550\/arXiv.2304.07232"},{"key":"1190_CR115","unstructured":"Asare, O.: Security Evaluations of GitHub\u2019s Copilot, August 2023. http:\/\/hdl.handle.net\/10012\/19675. Accessed 18 March 2025. [Online]."},{"key":"1190_CR116","doi-asserted-by":"publisher","unstructured":"Wang, J., Huang, Z., Liu, H., Yang, N., Xiao, Y.: DefectHunter: a Novel LLM-Driven Boosted-Conformer-based Code Vulnerability Detection Mechanism, 27 September 2023, arXiv: arXiv:2309.15324. https:\/\/doi.org\/10.48550\/arXiv.2309.15324 (2023)","DOI":"10.48550\/arXiv.2309.15324"},{"key":"1190_CR117","doi-asserted-by":"publisher","unstructured":"Zhang, C., Liu, H., Zeng, J., Yang, K., Li, Y., Li, H.: Prompt-enhanced software vulnerability detection using ChatGPT. In: Proceedings of the 2024 IEEE\/ACM 46th International Conference on Software Engineering: Companion Proceedings, in ICSE-Companion \u201924. New York, NY, USA (2024). Association for Computing Machinery, May 2024, pp. 276\u2013277. https:\/\/doi.org\/10.1145\/3639478.3643065.","DOI":"10.1145\/3639478.3643065"},{"issue":"11","key":"1190_CR118","doi-asserted-by":"publisher","DOI":"10.3390\/a14110335","volume":"14","author":"H Wei","year":"2021","unstructured":"Wei, H., Lin, G., Li, L., Jia, H.: A context-aware neural embedding for function-level vulnerability detection. Algorithms 14(11), 11 (2021). https:\/\/doi.org\/10.3390\/a14110335","journal-title":"Algorithms"},{"key":"1190_CR119","doi-asserted-by":"publisher","unstructured":"Mahyari, A.: A hierarchical deep neural network for detecting lines of codes with vulnerabilities. In: 2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C), Dec. 2022, pp. 1\u20137. https:\/\/doi.org\/10.1109\/QRS-C57518.2022.00011 (2022)","DOI":"10.1109\/QRS-C57518.2022.00011"},{"issue":"7","key":"1190_CR120","doi-asserted-by":"publisher","first-page":"3289","DOI":"10.1109\/TII.2018.2821768","volume":"14","author":"G Lin","year":"2018","unstructured":"Lin, G., et al.: Cross-project transfer representation learning for vulnerable function discovery. IEEE Trans. Ind. Inform. 14(7), 3289\u20133297 (2018). https:\/\/doi.org\/10.1109\/TII.2018.2821768","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"9","key":"1190_CR121","doi-asserted-by":"publisher","first-page":"3280","DOI":"10.1109\/TSE.2021.3087402","volume":"48","author":"S Chakraborty","year":"2022","unstructured":"Chakraborty, S., Krishna, R., Ding, Y., Ray, B.: Deep learning based vulnerability detection: are we there yet? IEEE Trans. Softw. Eng. 48(9), 3280\u20133296 (2022). https:\/\/doi.org\/10.1109\/TSE.2021.3087402","journal-title":"IEEE Trans. Softw. Eng."},{"key":"1190_CR122","doi-asserted-by":"publisher","unstructured":"Malware detection in android based on dynamic analysis. In: 2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security), IEEE, London, UK ResearchGate (2017). https:\/\/doi.org\/10.1109\/CyberSecPODS.2017.8074847.","DOI":"10.1109\/CyberSecPODS.2017.8074847"},{"key":"1190_CR123","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2024.103920","volume":"92","author":"HD Misalkar","year":"2025","unstructured":"Misalkar, H.D., Harshavardhanan, P.: TDBAMLA: temporal and dynamic behavior analysis in Android malware using LSTM and attention mechanisms. Comput. Stand. Interfaces 92, 103920 (2025). https:\/\/doi.org\/10.1016\/j.csi.2024.103920","journal-title":"Comput. Stand. Interfaces"},{"key":"1190_CR124","doi-asserted-by":"publisher","unstructured":"Yuan, B., et al.: Enhancing deep learning-based vulnerability detection by building behavior graph model. In: Proceedings of the 45th International Conference on Software Engineering, in ICSE \u201923, pp. 2262\u20132274. IEEE Press, Melbourne, Victoria, Australia (2023) https:\/\/doi.org\/10.1109\/ICSE48619.2023.00190.","DOI":"10.1109\/ICSE48619.2023.00190"},{"issue":"3","key":"1190_CR125","doi-asserted-by":"publisher","DOI":"10.3390\/computers12030060","volume":"12","author":"Z Li","year":"2023","unstructured":"Li, Z., Li, H., Meng, L.: Model compression for deep neural networks: a survey. Computers 12(3), 60 (2023). https:\/\/doi.org\/10.3390\/computers12030060","journal-title":"Computers"},{"key":"1190_CR126","doi-asserted-by":"publisher","unstructured":"Jedrzejewski, F.V.: Threat Modeling of ML-intensive Systems: Research Proposal. In: Proceedings of the IEEE\/ACM 3rd International Conference on AI Engineering\u2014Software Engineering for AI, in CAIN \u201924. New York, NY, USA: Association for Computing Machinery, June 2024, pp. 264\u2013266. https:\/\/doi.org\/10.1145\/3644815.3644975 (2024)","DOI":"10.1145\/3644815.3644975"},{"key":"1190_CR127","doi-asserted-by":"publisher","unstructured":"DARPA\u2019s Explainable Artificial Intelligence (XAI) Program. ResearchGate. https:\/\/doi.org\/10.1609\/aimag.v40i2.2850 (2024)","DOI":"10.1609\/aimag.v40i2.2850"},{"key":"1190_CR128","doi-asserted-by":"crossref","unstructured":"Phillips, P.J., et al.: Four principles of explainable artificial intelligence. NIST. https:\/\/www.nist.gov\/publications\/four-principles-explainable-artificial-intelligence (Sep. 2021). Accessed 25 Mar 2025 [Online].","DOI":"10.6028\/NIST.IR.8312-draft"},{"key":"1190_CR129","doi-asserted-by":"publisher","unstructured":"Srivastava, G., et al.: XAI for Cybersecurity: State of the Art, Challenges, Open Issues and Future Directions, arXiv: arXiv:2206.03585. https:\/\/doi.org\/10.48550\/arXiv.2206.03585 (2022)","DOI":"10.48550\/arXiv.2206.03585"},{"key":"1190_CR130","doi-asserted-by":"publisher","unstructured":"Nguyen, T.N., Choo, R.: Human-in-the-Loop XAI-enabled Vulnerability Detection, Investigation, and Mitigation. In: 2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE), Nov. 2021, pp. 1210\u20131212. https:\/\/doi.org\/10.1109\/ASE51524.2021.9678840 (2021)","DOI":"10.1109\/ASE51524.2021.9678840"},{"key":"1190_CR131","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.110830","volume":"278","author":"A Wijekoon","year":"2023","unstructured":"Wijekoon, A., Wiratunga, N.: A user-centred evaluation of DisCERN: discovering counterfactuals for code vulnerability detection and correction. Knowl.-Based Syst. 278, 110830 (2023). https:\/\/doi.org\/10.1016\/j.knosys.2023.110830","journal-title":"Knowl.-Based Syst."},{"key":"1190_CR132","doi-asserted-by":"publisher","unstructured":"Francy, S., Singh, R.: Edge AI: Evaluation of Model Compression Techniques for Convolutional Neural Networks. 02 Sep 2024, arXiv: arXiv:2409.02134. https:\/\/doi.org\/10.48550\/arXiv.2409.02134.","DOI":"10.48550\/arXiv.2409.02134"},{"issue":"12","key":"1190_CR133","doi-asserted-by":"publisher","DOI":"10.3390\/electronics14122495","volume":"14","author":"D Ngo","year":"2025","unstructured":"Ngo, D., Park, H.-C., Kang, B.: Edge intelligence: a review of deep neural network inference in resource-limited environments. Electronics 14(12), 2495 (2025). https:\/\/doi.org\/10.3390\/electronics14122495","journal-title":"Electronics"},{"key":"1190_CR134","doi-asserted-by":"publisher","unstructured":"Tan, F., et al.: MobileQuant: Mobile-friendly Quantization for On-device Language Models. In: Al-Onaizan, Y., Bansal, M., Chen, Y.-N. (eds.) Findings of the Association for Computational Linguistics: EMNLP 2024, pp. 9761\u20139771. Miami, Florida, USA (2024) Association for Computational Linguistics, Nov. 2024. https:\/\/doi.org\/10.18653\/v1\/2024.findings-emnlp.570.","DOI":"10.18653\/v1\/2024.findings-emnlp.570"},{"key":"1190_CR135","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2024.104094","volume":"235","author":"B Molina-Coronado","year":"2025","unstructured":"Molina-Coronado, B., Ruggia, A., Mori, U., Merlo, A., Mendiburu, A., Miguel-Alonso, J.: Light up that Droid! On the effectiveness of static analysis features against app obfuscation for Android malware detection. J. Netw. Comput. Appl. 235, 104094 (2025). https:\/\/doi.org\/10.1016\/j.jnca.2024.104094","journal-title":"J. Netw. Comput. Appl."},{"key":"1190_CR136","doi-asserted-by":"publisher","unstructured":"Sun, Y., et al.: A transformer based malicious traffic detection method in\u00a0android mobile networks. In: Sheng, Q.Z., Dobbie, G., Jiang, J., Zhang, X., Zhang, W. E., Manolopoulos, Y., Wu, J., Mansoor, W., Ma, C. (eds.) Advanced Data Mining and Applications, pp. 370\u2013385. Springer Nature, Singapore (2025) https:\/\/doi.org\/10.1007\/978-981-96-0821-8_25.","DOI":"10.1007\/978-981-96-0821-8_25"},{"issue":"1","key":"1190_CR137","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-024-00914-z","volume":"24","author":"L Prates","year":"2024","unstructured":"Prates, L., Pereira, R.: DevSecOps practices and tools. Int. J. Inf. Secur. 24(1), 11 (2024). https:\/\/doi.org\/10.1007\/s10207-024-00914-z","journal-title":"Int. J. Inf. Secur."},{"issue":"23s","key":"1190_CR138","first-page":"3048","volume":"12","author":"N Alugunuri","year":"2024","unstructured":"Alugunuri, N.: AI for continuous security in DevOps (DevSecOps): integrating machine learning into CI\/CD pipelines. Int. J. Intell. Syst. Appl. Eng. 12(23s), 3048\u20133062 (2024)","journal-title":"Int. J. Intell. Syst. Appl. Eng."},{"key":"1190_CR139","doi-asserted-by":"publisher","unstructured":"Nazir, A., et al.: Evaluating energy efficiency of buildings using artificial neural networks and k-means clustering techniques. In: 2020 3rd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), Jan. 2020, pp. 1\u20137. https:\/\/doi.org\/10.1109\/iCoMET48670.2020.9073816 (2020)","DOI":"10.1109\/iCoMET48670.2020.9073816"},{"key":"1190_CR140","doi-asserted-by":"publisher","unstructured":"Krutz, D.E., Munaiah, N., Peruma, A., Wiem Mkaouer, M.: Who Added That Permission to My App? An Analysis of Developer Permission Changes in Open Source Android Apps. In: 2017 IEEE\/ACM 4th International Conference on Mobile Software Engineering and Systems (MOBILESoft), May 2017, pp. 165\u2013169. https:\/\/doi.org\/10.1109\/MOBILESoft.2017.5. (2017)","DOI":"10.1109\/MOBILESoft.2017.5"},{"key":"1190_CR141","doi-asserted-by":"publisher","unstructured":"Geiger, F.-X., Malavolta, I., Pascarella, L., Palomba, F., Di Nucci, D., Bacchelli, A.: A graph-based dataset of commit history of real-world Android apps. In: Proceedings of the 15th International Conference on Mining Software Repositories, in MSR \u201918. Association for Computing Machinery, May 2018, pp. 30\u201333. New York, NY, USA (2018) https:\/\/doi.org\/10.1145\/3196398.3196460.","DOI":"10.1145\/3196398.3196460"},{"key":"1190_CR142","unstructured":"Namrud, Z., Kpodjedo, S., Talhi, C.: AndroVul: a repository for Android security vulnerabilities, In: Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering, in CASCON \u201919, November 2019, pp. 64\u201371. USA, IBM Corp (2019)"},{"key":"1190_CR143","doi-asserted-by":"publisher","unstructured":"Allix, K., Bissyand\u00e9, T. F., Klein, J., Le Traon, Y.: AndroZoo: collecting millions of Android apps for the research community, In: Proceedings of the 13th International Conference on Mining Software Repositories, in MSR \u201916, New York, NY, USA (2016). Association for Computing Machinery, May 2016, pp. 468\u2013471. https:\/\/doi.org\/10.1145\/2901739.2903508.","DOI":"10.1145\/2901739.2903508"},{"key":"1190_CR144","doi-asserted-by":"publisher","unstructured":"JEMMA: An extensible Java dataset for ML4Code applications. |Empirical Software Engineering. https:\/\/link.springer.com\/article\/https:\/\/doi.org\/10.1007\/s10664-022-10275-7. Accessed 18 Mar 2025 [Online]","DOI":"10.1007\/s10664-022-10275-7"},{"key":"1190_CR145","doi-asserted-by":"publisher","unstructured":"Geiger, F.-X., Malavolta, I.: Datasets of android applications: a literature review. (2018). arXiv:1809.10069. https:\/\/doi.org\/10.48550\/arXiv.1809.10069.","DOI":"10.48550\/arXiv.1809.10069"},{"issue":"6","key":"1190_CR146","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3417978","volume":"53","author":"J Qiu","year":"2020","unstructured":"Qiu, J., Zhang, J., Luo, W., Pan, L., Nepal, S., Xiang, Y.: A survey of Android malware detection with deep neural models. ACM Comput. Surv. 53(6), 1\u201336 (2020). https:\/\/doi.org\/10.1145\/3417978","journal-title":"ACM Comput. Surv."},{"key":"1190_CR147","doi-asserted-by":"publisher","first-page":"301285","DOI":"10.1016\/j.fsidi.2021.301285","volume":"39","author":"X Zhang","year":"2021","unstructured":"Zhang, X., Breitinger, F., Luechinger, E., O\u2019Shaughnessy, S.: Android application forensics: a survey of obfuscation, obfuscation detection and deobfuscation techniques and their impact on investigations. Forensic Sci. Int. Digit. Investig. 39, 301285 (2021). https:\/\/doi.org\/10.1016\/j.fsidi.2021.301285","journal-title":"Forensic Sci. Int. Digit. Investig."},{"key":"1190_CR148","doi-asserted-by":"publisher","first-page":"300999","DOI":"10.1016\/j.fsidi.2020.300999","volume":"34","author":"T Wu","year":"2020","unstructured":"Wu, T., Breitinger, F., O\u2019Shaughnessy, S.: Digital forensic tools: recent advances and enhancing the status quo. Forensic Sci. Int. Digit. Investig. 34, 300999 (2020). https:\/\/doi.org\/10.1016\/j.fsidi.2020.300999","journal-title":"Forensic Sci. Int. Digit. Investig."},{"key":"1190_CR149","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1016\/j.future.2018.07.066","volume":"90","author":"O Mirzaei","year":"2019","unstructured":"Mirzaei, O., de Fuentes, J.M., Tapiador, J., Gonzalez-Manzano, L.: AndrODet: an adaptive Android obfuscation detector. Future Gener. Comput. Syst. 90, 240\u2013261 (2019). https:\/\/doi.org\/10.1016\/j.future.2018.07.066","journal-title":"Future Gener. Comput. Syst."},{"key":"1190_CR150","doi-asserted-by":"publisher","unstructured":"Li, Z., Sun, J., Yan, Q., Srisa-an, W., Tsutano, Y.: Obfusifier: Obfuscation-Resistant Android Malware Detection System. In: Chen, S., Choo, K.-K. R., Fu, X., Lou, W., Mohaisen, A. (eds.) Security and Privacy in Communication Networks, pp. 214\u2013234. Springer International Publishing, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-37228-6_11.","DOI":"10.1007\/978-3-030-37228-6_11"},{"key":"1190_CR151","doi-asserted-by":"publisher","unstructured":"Pasetto, M., Marastoni, N., Preda, M. D.: Revealing similarities in android malware by dissecting their methods. In: 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 625\u2013634. https:\/\/doi.org\/10.1109\/EuroSPW51379.2020.00090(2020).","DOI":"10.1109\/EuroSPW51379.2020.00090"},{"key":"1190_CR152","doi-asserted-by":"crossref","unstructured":"The rise of obfuscated Android malware and impacts on detection methods [PeerJ]. https:\/\/peerj.com\/articles\/cs-907\/ (2022). Accessed 18 Mar 2025. [Online].","DOI":"10.7717\/peerj-cs.907"},{"key":"1190_CR153","unstructured":"Software Assurance Reference Dataset (SARD) Manual. NIST. https:\/\/www.nist.gov\/itl\/ssd\/software-quality-group\/software-assurance-reference-dataset-sard-manual (2021). Accessed 18 March 2025. [Online]."},{"key":"1190_CR154","unstructured":"Juliet C\/C++ 1.3. NIST Software Assurance Reference Dataset. https:\/\/samate.nist.gov\/SARD (2011). Accessed 18 Mar 2025. [Online]."},{"key":"1190_CR155","doi-asserted-by":"publisher","unstructured":"Allamanis, M.: The adverse effects of code duplication in machine learning models of code In: Proceedings of the 2019 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software. https:\/\/dl.acm.org\/doi\/abs\/https:\/\/doi.org\/10.1145\/3359591.3359735 (2019). Accessed 18 Mar 2025 [Online].","DOI":"10.1145\/3359591.3359735"},{"key":"1190_CR156","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111031","volume":"180","author":"G Giray","year":"2021","unstructured":"Giray, G.: A software engineering perspective on engineering machine learning systems: state of the art and challenges. J. Syst. Softw. 180, 111031 (2021). https:\/\/doi.org\/10.1016\/j.jss.2021.111031","journal-title":"J. Syst. Softw."},{"issue":"9","key":"1190_CR157","doi-asserted-by":"publisher","first-page":"1857","DOI":"10.1109\/TSE.2019.2937083","volume":"47","author":"Z Wan","year":"2021","unstructured":"Wan, Z., Xia, X., Lo, D., Murphy, G.C.: How does machine learning change software development practices? IEEE Trans. Softw. Eng. 47(9), 1857\u20131871 (2021). https:\/\/doi.org\/10.1109\/TSE.2019.2937083","journal-title":"IEEE Trans. Softw. Eng."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01190-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01190-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01190-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T16:07:35Z","timestamp":1769875655000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01190-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,27]]},"references-count":157,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["1190"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01190-1","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,27]]},"assertion":[{"value":"2 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}}],"article-number":"17"}}