{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:34:47Z","timestamp":1772645687595,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T00:00:00Z","timestamp":1668729600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T00:00:00Z","timestamp":1668729600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100022963","name":"Key Research and Development Program of Zhejiang Province","doi-asserted-by":"crossref","award":["2020C01165"],"award-info":[{"award-number":["2020C01165"]}],"id":[{"id":"10.13039\/100022963","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["LY21F020020"],"award-info":[{"award-number":["LY21F020020"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902096"],"award-info":[{"award-number":["61902096"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702144"],"award-info":[{"award-number":["61702144"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Industrial Internet Innovation and Development Project of Ministry of Industry and Information Technology","award":["TC200802G, TC2008033"],"award-info":[{"award-number":["TC200802G, TC2008033"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Software Qual J"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s11219-022-09602-4","type":"journal-article","created":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T08:30:11Z","timestamp":1668760211000},"page":"655-685","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Predicting Android malware combining permissions and API call sequences"],"prefix":"10.1007","volume":"31","author":[{"given":"Xin","family":"Chen","sequence":"first","affiliation":[]},{"given":"Haihua","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8919-1613","authenticated-orcid":false,"given":"Dongjin","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xiaoxiao","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,18]]},"reference":[{"key":"9602_CR1","doi-asserted-by":"crossref","unstructured":"Aafer, Y., Du, W., & Yin, H. (2013). Droidapiminer: Mining API-level features for robust malware detection in android. In International Conference on Security and Privacy in Communication Systems (pp. 86\u2013103). Springer.","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"9602_CR2","doi-asserted-by":"crossref","unstructured":"Alazab, M., Alazab, M., Shalaginov, A., Mesleh, A., & Awajan, A. (2020). Intelligent mobile malware detection using permission requests and API calls. Future Generation Computer Systems, 107, 509\u2013521. Publisher: Elsevier.","DOI":"10.1016\/j.future.2020.02.002"},{"key":"9602_CR3","doi-asserted-by":"crossref","unstructured":"Allix, K., Bissyand, T. F., Klein, J., & Le Traon, Y. (2016). Androzoo: Collecting millions of android apps for the research community. In 2016 IEEE\/ACM 13th Working Conference on Mining Software Repositories (MSR) (pp. 468\u2013471). IEEE.","DOI":"10.1145\/2901739.2903508"},{"key":"9602_CR4","first-page":"23","volume":"14","author":"D Arp","year":"2014","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., & Siemens, C. (2014). Drebin: Effective and explainable detection of android malware in your pocket. NDSS, 14, 23\u201326.","journal-title":"NDSS"},{"issue":"9","key":"9602_CR5","first-page":"142","volume":"17","author":"L Bottou","year":"1998","unstructured":"Bottou, L. (1998). Online learning and stochastic approximations. On-line Learning in Neural Networks, 17(9), 142.","journal-title":"On-line Learning in Neural Networks"},{"key":"9602_CR6","doi-asserted-by":"crossref","unstructured":"Breiman, L. (2001). Random forests. Machine Learning, 45(1), 5\u201332. Publisher: Springer.","DOI":"10.1023\/A:1010933404324"},{"key":"9602_CR7","doi-asserted-by":"crossref","unstructured":"Burguera, I., Zurutuza, U., & Nadjm-Tehrani, S. (2011). Crowdroid: behavior-based malware detection system for android. In Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (pp 15\u201326).","DOI":"10.1145\/2046614.2046619"},{"key":"9602_CR8","doi-asserted-by":"crossref","unstructured":"Garg, S., & Baliyan, N. (2019). A novel parallel classifier scheme for vulnerability detection in android. Computers & Electrical Engineering, 77, 12\u201326. Publisher: Elsevier.","DOI":"10.1016\/j.compeleceng.2019.04.019"},{"key":"9602_CR9","doi-asserted-by":"crossref","unstructured":"Han, K., Kang, B., & Im, E. G. (2014). Malware analysis using visualized image matrices. The Scientific World Journal, 2014. Publisher: Hindawi.","DOI":"10.1155\/2014\/132713"},{"key":"9602_CR10","volume-title":"Digital design and computer architecture","author":"D Harris","year":"2010","unstructured":"Harris, D., & Harris, S. (2010). Digital design and computer architecture. Morgan Kaufmann."},{"key":"9602_CR11","unstructured":"Herley, C. E., Keogh, B. W., Hulett, A. M., Marinescu, A. M., Williams, J. S., & Nurilov, S. (2015). Spyware detection mechanism. Google Patents."},{"issue":"8","key":"9602_CR12","doi-asserted-by":"publisher","first-page":"2555","DOI":"10.1109\/TPAMI.2020.2976928","volume":"43","author":"T Hui","year":"2021","unstructured":"Hui, T., Tang, X., & Loy, C. C. (2021). A lightweight optical flow CNN - revisiting data fidelity and regularization. IEEE Transactions on Pattern Analysis and Machine Intelligence, 43(8), 2555\u20132569.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"9602_CR13","doi-asserted-by":"crossref","unstructured":"Jerbi, M., Dagdia, Z. C., Bechikh, S., & Said, L. B. (2020). On the use of artificial malicious patterns for android malware detection. Computers & Security, 92, 101743. Publisher: Elsevier.","DOI":"10.1016\/j.cose.2020.101743"},{"key":"9602_CR14","doi-asserted-by":"crossref","unstructured":"Karbab, E. B., Debbabi, M., Alrabaee, S., & Mouheb, D. (2016). DySign: Dynamic fingerprinting for the automatic detection of android malware. In 2016 11th International Conference on Malicious and Unwanted Software (MALWARE) (pp. 1\u20138) IEEE.","DOI":"10.1109\/MALWARE.2016.7888739"},{"key":"9602_CR15","doi-asserted-by":"crossref","unstructured":"Karbab, E. B., Debbabi, M., Derhab, A., & Mouheb, D. (2018). MalDozer: Automatic framework for android malware detection using deep learning. Digital Investigation, 24, S48\u2013S59. Publisher: Elsevier.","DOI":"10.1016\/j.diin.2018.01.007"},{"key":"9602_CR16","unstructured":"Kingma, D. P., & Ba, J. (2014). Adam: A method for stochastic optimization. Preprint retrieved from http:\/\/arxiv.org\/abs\/1412.6980"},{"key":"9602_CR17","unstructured":"Kohavi, R., et al. (1995). A study of cross-validation and bootstrap for accuracy estimation and model selection. In\u00a0IJCAI\u00a0(vol.\u00a014,\u00a0pp. 1137\u20131145). Montreal, Canada."},{"key":"9602_CR18","doi-asserted-by":"crossref","unstructured":"Landwehr, C. E., Bull, A. R., McDermott, J. P., & Choi, W. S. (1994). A taxonomy of computer program security flaws. ACM Computing Surveys (CSUR), 26(3), 211\u2013254. Publisher: ACM New York, NY, USA.","DOI":"10.1145\/185403.185412"},{"key":"9602_CR19","doi-asserted-by":"crossref","unstructured":"LeCun, Y., Bottou, L., Bengio, Y., & Haffner, P. (1998a). Gradient-based learning applied to document recognition. Proceedings of the IEEE, 86(11), 2278\u20132324. Publisher: IEEE.","DOI":"10.1109\/5.726791"},{"issue":"11","key":"9602_CR20","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun, Y., Bottou, L., Bengio, Y., & Haffner, P. (1998). Gradient-based learning applied to document recognition. Proceedings of the IEEE, 86(11), 2278\u20132324.","journal-title":"Proceedings of the IEEE"},{"key":"9602_CR21","doi-asserted-by":"crossref","unstructured":"Mercaldo, F., Visaggio, C. A., Canfora, G., & Cimitile, A. (2016). Mobile malware detection in the real world. In 2016 IEEE\/ACM 38th International Conference on Software Engineering Companion (ICSE-C) (pp. 744\u2013746) IEEE.","DOI":"10.1145\/2889160.2892656"},{"key":"9602_CR22","unstructured":"Mikolov, T., Chen, K., Corrado, G., & Dean, J. (2013a). Efficient estimation of word representations in vector space. Preprint retrieved from http:\/\/arxiv.org\/abs\/1301.3781"},{"key":"9602_CR23","unstructured":"Mikolov, T., Sutskever, I., Chen, K., Corrado, G. S., & Dean, J. (2013b). Distributed representations of words and phrases and their compositionality. In Advances in Neural Information Processing Systems (pp. 3111\u20133119)."},{"key":"9602_CR24","volume-title":"An undirected attack against critical infrastructure","author":"T Nash","year":"2005","unstructured":"Nash, T. (2005). An undirected attack against critical infrastructure. US-CERT Control Systems Security Center: Technical Report."},{"key":"9602_CR25","unstructured":"Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., et al. (2011). Scikit-learn: Machine learning in Python. The Journal of Machine Learning Research, 12, 2825\u20132830. Publisher: JMLR.org"},{"key":"9602_CR26","doi-asserted-by":"crossref","unstructured":"Peiravian, N., & Zhu, X. (2013). Machine learning for android malware detection using permission and API calls. In 2013 IEEE 25th International Conference on Tools with Artificial Intelligence (pp. 300\u2013305). IEEE.","DOI":"10.1109\/ICTAI.2013.53"},{"key":"9602_CR27","doi-asserted-by":"crossref","unstructured":"Pekta\u015f, A., & Acarman, T. (2020). Deep learning for effective Android malware detection using API call graph embeddings. Soft Computing, 24(2), 1027\u20131043. Publisher: Springer.","DOI":"10.1007\/s00500-019-03940-5"},{"key":"9602_CR28","doi-asserted-by":"crossref","unstructured":"Quinlan, J. R. (1986). Induction of decision trees. Machine Learning, 1(1), 81\u2013106. Publisher: Springer.","DOI":"10.1007\/BF00116251"},{"key":"9602_CR29","doi-asserted-by":"crossref","unstructured":"Shao, Y., Chen, Q. A., Mao, Z. M., Ott, J., & Qian, Z. (2016). Kratos: Discovering inconsistent security policy enforcement in the android framework. In NDSS.","DOI":"10.14722\/ndss.2016.23046"},{"key":"9602_CR30","unstructured":"Srinivasa-Desikan, B. (2018). Natural language processing and computational linguistics: A practical guide to text analysis with Python, Gensim, spaCy, and Keras. Packt Publishing Ltd."},{"key":"9602_CR31","unstructured":"Vapnik, V. (2013). The nature of statistical learning theory. Springer Science & Business Media."},{"key":"9602_CR32","doi-asserted-by":"crossref","unstructured":"Vasan, D., Alazab, M., Wassan, S., Naeem, H., Safaei, B., & Zheng, Q. (2020). IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture. Computer Networks, 171, 107138. Publisher: Elsevier.","DOI":"10.1016\/j.comnet.2020.107138"},{"key":"9602_CR33","doi-asserted-by":"crossref","unstructured":"Wang, W., Wang, X., Feng, D., Liu, J., Han, Z., & Zhang, X. (2014). Exploring permission-induced risk in android applications for malicious application detection. IEEE Transactions on Information Forensics and Security, 9(11), 1869\u20131882. Publisher: IEEE.","DOI":"10.1109\/TIFS.2014.2353996"},{"key":"9602_CR34","doi-asserted-by":"crossref","unstructured":"Wu, D. J., Mao, C. H., Wei, T. E., Lee, H. M., & Wu, K. P. (2012). Droidmat: Android malware detection through manifest and API calls tracing. In\u00a02012 Seventh Asia Joint Conference on Information Security\u00a0(pp 62\u201369).\u00a0IEEE.","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"9602_CR35","doi-asserted-by":"crossref","unstructured":"Wu, Y., Li, X., Zou, D., Yang, W., Zhang, X., & Jin, H. (2019). MalScan: Fast market-wide mobile malware scanning by social-network centrality analysis. In 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE) (pp. 139\u2013150). IEEE","DOI":"10.1109\/ASE.2019.00023"},{"key":"9602_CR36","doi-asserted-by":"crossref","unstructured":"Xu, L., Zhang, D., Jayasena, N., & Cavazos, J. (2016). HADM: Hybrid analysis for detection of malware. In Proceedings of SAI Intelligent Systems Conference (pp. 702\u2013724). Springer.","DOI":"10.1007\/978-3-319-56991-8_51"},{"key":"9602_CR37","doi-asserted-by":"crossref","unstructured":"Young, A., & Yung, M. (1996). Cryptovirology: Extortion-based security threats and countermeasures. In Proceedings 1996 IEEE Symposium on Security and Privacy (pp 129\u2013140). IEEE.","DOI":"10.1109\/SECPRI.1996.502676"},{"key":"9602_CR38","doi-asserted-by":"crossref","unstructured":"Zhou, Y., & Jiang, X. (2012). Dissecting android malware: Characterization and evolution. In 2012 IEEE Symposium on Security and Privacy (pp 95\u2013109). IEEE.","DOI":"10.1109\/SP.2012.16"},{"key":"9602_CR39","doi-asserted-by":"crossref","unstructured":"Zhu, H. J., Jiang, T. H., Ma, B., You, Z. H., Shi, W. L., & Cheng, L. (2018). HEMD: A highly efficient random forest-based malware detection framework for Android. Neural Computing and Applications, 30(11), 3353\u20133361. Publisher: Springer.","DOI":"10.1007\/s00521-017-2914-y"}],"container-title":["Software Quality Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-022-09602-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11219-022-09602-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-022-09602-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,31]],"date-time":"2023-08-31T10:18:35Z","timestamp":1693477115000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11219-022-09602-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,18]]},"references-count":39,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["9602"],"URL":"https:\/\/doi.org\/10.1007\/s11219-022-09602-4","relation":{},"ISSN":["0963-9314","1573-1367"],"issn-type":[{"value":"0963-9314","type":"print"},{"value":"1573-1367","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,18]]},"assertion":[{"value":"26 September 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 November 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}