{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T04:03:44Z","timestamp":1748059424116,"version":"3.41.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T00:00:00Z","timestamp":1718841600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T00:00:00Z","timestamp":1718841600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-19517-w","type":"journal-article","created":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T08:02:11Z","timestamp":1718870531000},"page":"15357-15386","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An efficient security testing for android application based on behavior and activities using RFE-MLP and ensemble classifier"],"prefix":"10.1007","volume":"84","author":[{"given":"Pawan","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Sukhdip","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,20]]},"reference":[{"issue":"2","key":"19517_CR1","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/s10044-022-01104-0","volume":"26","author":"AK Sahu","year":"2023","unstructured":"Sahu AK, Sahu M, Patro P, Sahu G, Nayak SR (2023) Dual image-based reversible fragile watermarking scheme for tamper detection and localization. Pattern Anal Appl 26(2):571\u2013590","journal-title":"Pattern Anal Appl"},{"key":"19517_CR2","doi-asserted-by":"publisher","first-page":"101663","DOI":"10.1016\/j.cose.2019.101663","volume":"89","author":"MK Alzaylaee","year":"2020","unstructured":"Alzaylaee MK, Yerima SY, Sezer S (2020) DL-Droid: deep learning based android malware detection using real devices. Comput Secur 89:101663","journal-title":"Comput Secur"},{"key":"19517_CR3","doi-asserted-by":"publisher","unstructured":"Karthick S, Muthukumaran N (2023) Deep regression network for single-image super-resolution based on down- and upsampling with RCA blocks. Natl Acad Sci Lett.\u00a0https:\/\/doi.org\/10.1007\/s40009-023-01353-5","DOI":"10.1007\/s40009-023-01353-5"},{"key":"19517_CR4","doi-asserted-by":"crossref","unstructured":"Zhou H, Yang X, Pan H, Guo W (2020) An android malware detection approach based on SIMGRU. IEEE Access 8:148404\u2013148410","DOI":"10.1109\/ACCESS.2020.3007571"},{"key":"19517_CR5","doi-asserted-by":"publisher","first-page":"181102","DOI":"10.1109\/ACCESS.2020.3028370","volume":"8","author":"Z Wang","year":"2020","unstructured":"Wang Z, Liu Q, Chi Y (2020) Review of android malware detection based on deep learning. IEEE Access 8:181102\u2013181126","journal-title":"IEEE Access"},{"issue":"10","key":"19517_CR6","doi-asserted-by":"publisher","first-page":"326","DOI":"10.3390\/info10100326","volume":"10","author":"A Amin","year":"2019","unstructured":"Amin A, Eldessouki A, Magdy MT, Abdeen N, Hindy H, Hegazy I (2019) Androshield: automated android applications vulnerability detection, a hybrid static and dynamic analysis approach. Information 10(10):326","journal-title":"Information"},{"issue":"18","key":"19517_CR7","doi-asserted-by":"publisher","first-page":"15165","DOI":"10.1007\/s00521-021-06755-4","volume":"34","author":"S Seraj","year":"2022","unstructured":"Seraj S, Khodambashi S, Pavlidis M, Polatidis N (2022) HamDroid: permission-based harmful android anti-malware detection using neural networks. Neural Comput Appl 34(18):15165\u201315174","journal-title":"Neural Comput Appl"},{"key":"19517_CR8","doi-asserted-by":"publisher","unstructured":"Karthick S, Muthukumaran N (2024) U-Net based deep regression network architecture for single image super resolution of license plate image. In: Senjyu T, So\u2013In C, Joshi A (eds) Smart Trends in Computing and Communications. SmartCom 2024 2024. Lecture Notes in Networks and Systems, vol 946. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-97-1323-3_26","DOI":"10.1007\/978-981-97-1323-3_26"},{"key":"19517_CR9","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1016\/j.future.2020.02.002","volume":"107","author":"M Alazab","year":"2020","unstructured":"Alazab M, Alazab M, Shalaginov A, Mesleh A, Awajan A (2020) Intelligent mobile malware detection using permission requests and API calls. Futur Gener Comput Syst 107:509\u2013521","journal-title":"Futur Gener Comput Syst"},{"key":"19517_CR10","doi-asserted-by":"publisher","first-page":"89031","DOI":"10.1109\/ACCESS.2022.3149053","volume":"10","author":"B Urooj","year":"2022","unstructured":"Urooj B, Shah MA, Maple C, Abbasi MK, Riasat S (2022) Malware detection: a framework for reverse engineered android applications through machine learning algorithms. IEEE Access 10:89031\u201389050","journal-title":"IEEE Access"},{"issue":"1","key":"19517_CR11","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s11416-022-00432-3","volume":"19","author":"A Guerra-Manzanares","year":"2023","unstructured":"Guerra-Manzanares A, Bahsi H, Luckner M (2023) Leveraging the first line of defense: a study on the evolution and usage of android security permissions for enhanced android malware detection. J Comput Virol Hacking Tech 19(1):65\u201396","journal-title":"J Comput Virol Hacking Tech"},{"key":"19517_CR12","doi-asserted-by":"publisher","first-page":"102098","DOI":"10.1016\/j.adhoc.2020.102098","volume":"101","author":"Z Ren","year":"2020","unstructured":"Ren Z, Wu H, Ning Q, Hussain I, Chen B (2020) End-to-end malware detection for android IoT devices using deep learning. Ad Hoc Netw 101:102098","journal-title":"Ad Hoc Netw"},{"issue":"1","key":"19517_CR13","doi-asserted-by":"publisher","first-page":"2007327","DOI":"10.1080\/08839514.2021.2007327","volume":"36","author":"L Meijin","year":"2022","unstructured":"Meijin L, Zhiyang F, Junfeng W, Luyu C, Qi Z, Tao Y, Yinwei W, Jiaxuan G (2022) A systematic overview of android malware detection. Appl Artif Intell 36(1):2007327","journal-title":"Appl Artif Intell"},{"issue":"6","key":"19517_CR14","doi-asserted-by":"publisher","first-page":"2268","DOI":"10.3390\/s22062268","volume":"22","author":"H Alkahtani","year":"2022","unstructured":"Alkahtani H, Aldhyani TH (2022) Artificial intelligence algorithms for malware detection in android-operated mobile devices. Sensors 22(6):2268","journal-title":"Sensors"},{"key":"19517_CR15","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.jpdc.2019.11.001","volume":"137","author":"G D\u2019Angelo","year":"2020","unstructured":"D\u2019Angelo G, Ficco M, Palmieri F (2020) Malware detection in mobile environments based on Autoencoders and API-images. J Parallel Distrib Comput 137:26\u201333","journal-title":"J Parallel Distrib Comput"},{"issue":"3","key":"19517_CR16","doi-asserted-by":"publisher","first-page":"355","DOI":"10.3390\/iot2030019","volume":"2","author":"A Fournier","year":"2021","unstructured":"Fournier A, El Khoury F, Pierre S (2021) A client\/server malware detection model based on machine learning for android devices. IoT 2(3):355\u2013374","journal-title":"IoT"},{"key":"19517_CR17","first-page":"102483","volume":"54","author":"R Surendran","year":"2020","unstructured":"Surendran R, Thomas T, Emmanuel S (2020) A TAN based hybrid model for android malware detection. J Inf Secur Appl 54:102483","journal-title":"J Inf Secur Appl"},{"key":"19517_CR18","doi-asserted-by":"publisher","first-page":"102622","DOI":"10.1016\/j.cose.2022.102622","volume":"115","author":"P Yadav","year":"2022","unstructured":"Yadav P, Menon N, Ravi V, Vishvanathan S, Pham TD (2022) EfficientNet convolutional neural networks-based Android malware detection. Comput Secur 115:102622","journal-title":"Comput Secur"},{"key":"19517_CR19","doi-asserted-by":"publisher","first-page":"96899","DOI":"10.1109\/ACCESS.2020.2995887","volume":"8","author":"J Jeon","year":"2020","unstructured":"Jeon J, Park JH, Jeong YS (2020) Dynamic analysis for IoT malware detection with convolution neural network model. IEEE Access 8:96899\u201396911","journal-title":"IEEE Access"},{"key":"19517_CR20","doi-asserted-by":"publisher","first-page":"110389","DOI":"10.1016\/j.asoc.2023.110389","volume":"143","author":"Y Zhang","year":"2023","unstructured":"Zhang Y, Feng F, Liao Z, Li Z, Yao S (2023) Universal backdoor attack on deep neural networks for malware detection. Appl Soft Comput 143:110389","journal-title":"Appl Soft Comput"},{"key":"19517_CR21","doi-asserted-by":"publisher","unstructured":"Lu T, Du Y, Ouyang L, Chen Q, Wang X (2020) Android malware detection based on a hybrid deep learning model. Secur Commun Netw 2020:8863617. https:\/\/doi.org\/10.1155\/2020\/8863617","DOI":"10.1155\/2020\/8863617"},{"issue":"10","key":"19517_CR22","doi-asserted-by":"publisher","first-page":"5183","DOI":"10.1007\/s00521-020-05309-4","volume":"33","author":"A Mahindru","year":"2021","unstructured":"Mahindru A, Sangal AL (2021) MLDroid\u2014framework for Android malware detection using machine learning techniques. Neural Comput Appl 33(10):5183\u20135240","journal-title":"Neural Comput Appl"},{"key":"19517_CR23","doi-asserted-by":"crossref","unstructured":"Zou D, Wu Y, Yang S, Chauhan A, Yang W, Zhong J, ... Jin H (2021) IntDroid: android malware detection based on API intimacy analysis. ACM Trans Softw Eng Methodol (TOSEM) 30(3):1\u201332","DOI":"10.1145\/3442588"},{"issue":"3","key":"19517_CR24","doi-asserted-by":"publisher","first-page":"52","DOI":"10.3390\/technologies9030052","volume":"9","author":"MM Ahsan","year":"2021","unstructured":"Ahsan MM, Mahmud MP, Saha PK, Gupta KD, Siddique Z (2021) Effect of data scaling methods on machine learning algorithms and model performance. Technologies 9(3):52","journal-title":"Technologies"},{"issue":"1","key":"19517_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-023-00694-8","volume":"10","author":"Y Yin","year":"2023","unstructured":"Yin Y, Jang-Jaccard J, Xu W, Singh A, Zhu J, Sabrina F, Kwak J (2023) IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset. J Big Data 10(1):1\u201326","journal-title":"J Big Data"},{"issue":"20","key":"19517_CR26","doi-asserted-by":"publisher","first-page":"4237","DOI":"10.3390\/app9204237","volume":"9","author":"T Le","year":"2019","unstructured":"Le T, Vo MT, Vo B, Hwang E, Rho S, Baik SW (2019) Improving electric energy consumption prediction using CNN and Bi-LSTM. Appl Sci 9(20):4237","journal-title":"Appl Sci"},{"issue":"10","key":"19517_CR27","doi-asserted-by":"publisher","first-page":"7319","DOI":"10.1109\/TIM.2020.2983233","volume":"69","author":"W Deng","year":"2020","unstructured":"Deng W, Liu H, Xu J, Zhao H, Song Y (2020) An improved quantum-inspired differential evolution algorithm for deep belief network. IEEE Trans Instrum Meas 69(10):7319\u20137327","journal-title":"IEEE Trans Instrum Meas"},{"issue":"3","key":"19517_CR28","doi-asserted-by":"publisher","first-page":"436","DOI":"10.3390\/land11030436","volume":"11","author":"J Huang","year":"2022","unstructured":"Huang J, Ling S, Wu X, Deng R (2022) GIS-based comparative study of the bayesian network, decision table, radial basis function network and stochastic gradient descent for the spatial prediction of landslide susceptibility. Land 11(3):436","journal-title":"Land"},{"issue":"16","key":"19517_CR29","doi-asserted-by":"publisher","first-page":"8371","DOI":"10.3390\/app12168371","volume":"12","author":"Z Mahmood","year":"2022","unstructured":"Mahmood Z, Butt NA, Rehman GU, Zubair M, Aslam M, Badshah A, Jilani SF (2022) Generation of controlled synthetic samples and impact of hyper-tuning parameters to effectively classify the complex structure of overlapping region. Appl Sci 12(16):8371","journal-title":"Appl Sci"},{"key":"19517_CR30","unstructured":"University of New Brunswick, CIC-MalMem- (2022). [https:\/\/www.unb.ca\/cic\/datasets\/malmem-2022.html]. Accessed on 16\u201307\u20132023"},{"key":"19517_CR31","doi-asserted-by":"publisher","first-page":"47792","DOI":"10.1109\/ACCESS.2022.3171912","volume":"10","author":"Y Gao","year":"2022","unstructured":"Gao Y, Hasegawa H, Yamaguchi Y, Shimada H (2022) Malware detection using LightGBM with a custom logistic loss function. IEEE Access 10:47792\u201347804","journal-title":"IEEE Access"},{"key":"19517_CR32","doi-asserted-by":"publisher","first-page":"113022","DOI":"10.1016\/j.eswa.2019.113022","volume":"143","author":"M Wadkar","year":"2020","unstructured":"Wadkar M, Di Troia F, Stamp M (2020) Detecting malware evolution using support vector machines. Expert Syst Appl 143:113022","journal-title":"Expert Syst Appl"},{"key":"19517_CR33","doi-asserted-by":"publisher","first-page":"536","DOI":"10.25046\/aj050566","volume":"5","author":"R Kumar","year":"2020","unstructured":"Kumar R, Geetha S (2020) Malware classification using XGboost-Gradient boosted decision tree. Adv Sci Technol Eng Syst 5:536\u2013549","journal-title":"Adv Sci Technol Eng Syst"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19517-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-19517-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19517-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T11:17:23Z","timestamp":1747999043000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-19517-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,20]]},"references-count":33,"journal-issue":{"issue":"15","published-online":{"date-parts":[[2025,5]]}},"alternative-id":["19517"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-19517-w","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,6,20]]},"assertion":[{"value":"9 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 May 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This article is a completely original work of its authors; it has not been published before and will not be sent to other publications until the journal\u2019s editorial board decides not to accept it for publication.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declared that they have no conflicts of interest to this work. We declare that we do not have any commercial or associative interest that represents a conflict of interest in connection with the work submitted.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}