{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T16:57:33Z","timestamp":1762102653473,"version":"build-2065373602"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1007\/s11277-024-11128-w","type":"journal-article","created":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T11:01:54Z","timestamp":1714734114000},"page":"1285-1314","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An Efficient Security Testing for Android Application Based on Behavior and Activities Using Improved PCA and DNN-KNN Classifier"],"prefix":"10.1007","volume":"135","author":[{"given":"Pawan","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Sukhdip","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,3]]},"reference":[{"issue":"3","key":"11128_CR1","first-page":"228","volume":"2","author":"WZ Zarni Aung","year":"2013","unstructured":"Zarni Aung, W. Z. (2013). Permission-based android malware detection. International Journal of Scientific & Technology Research, 2(3), 228\u2013234.","journal-title":"International Journal of Scientific & Technology Research"},{"key":"11128_CR2","doi-asserted-by":"crossref","unstructured":"Yumlembam, R., Issac, B., Jacob, S. M., & Yang, L. (2022). Iot-based android malware detection using graph neural network with adversarial defense.\u00a0IEEE Internet of Things Journal.","DOI":"10.1109\/JIOT.2022.3188583"},{"issue":"3","key":"11128_CR3","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1016\/j.icte.2021.09.003","volume":"8","author":"SRT Mat","year":"2022","unstructured":"Mat, S. R. T., Ab Razak, M. F., Kahar, M. N. M., Arif, J. M., & Firdaus, A. (2022). A Bayesian probability model for Android malware detection. ICT Express, 8(3), 424\u2013431.","journal-title":"ICT Express"},{"issue":"7","key":"11128_CR4","doi-asserted-by":"publisher","first-page":"2597","DOI":"10.3390\/s22072597","volume":"22","author":"X Wang","year":"2022","unstructured":"Wang, X., Zhang, L., Zhao, K., Ding, X., & Yu, M. (2022). MFDroid: A stacking ensemble learning framework for Android malware detection. Sensors, 22(7), 2597.","journal-title":"Sensors"},{"key":"11128_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117833","volume":"206","author":"AT Kabakus","year":"2022","unstructured":"Kabakus, A. T. (2022). DroidMalwareDetector: A novel Android malware detection framework based on convolutional neural network. Expert Systems with Applications, 206, 117833.","journal-title":"Expert Systems with Applications"},{"issue":"4","key":"11128_CR6","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1007\/s10207-022-00579-6","volume":"21","author":"J Kim","year":"2022","unstructured":"Kim, J., Ban, Y., Ko, E., Cho, H., & Yi, J. H. (2022). MAPAS: A practical deep learning-based android malware detection system. International Journal of Information Security, 21(4), 725\u2013738.","journal-title":"International Journal of Information Security"},{"key":"11128_CR7","doi-asserted-by":"publisher","unstructured":"Karthick, S., & Muthukumaran, N. (2023). Deep Regression Network for Single-Image Super-Resolution Based on Down- and Upsampling with RCA Blocks. National Academy Science Letters, 1\u20135, https:\/\/doi.org\/10.1007\/s40009-023-01353-5.","DOI":"10.1007\/s40009-023-01353-5"},{"key":"11128_CR8","doi-asserted-by":"publisher","first-page":"14246","DOI":"10.1109\/ACCESS.2022.3146363","volume":"10","author":"D\u00d6 \u015eah\u0131n","year":"2022","unstructured":"\u015eah\u0131n, D. \u00d6., Akleylek, S., & Kili\u00e7, E. (2022). LinRegDroid: Detection of android malware using multiple linear regression models-based classifiers. IEEE Access, 10, 14246\u201314259.","journal-title":"IEEE Access"},{"issue":"4","key":"11128_CR9","doi-asserted-by":"publisher","first-page":"59","DOI":"10.9734\/ajrcos\/2021\/v7i430189","volume":"7","author":"MA Omer","year":"2021","unstructured":"Omer, M. A., Zeebaree, S. R., Sadeeq, M. A., Salim, B. W., Rashid, Z. N., & Haji, L. M. (2021). Efficiency of malware detection in android system: A survey. Asian Journal of Research in Computer Science, 7(4), 59\u201369.","journal-title":"Asian Journal of Research in Computer Science"},{"key":"11128_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102929","volume":"61","author":"JM Arif","year":"2021","unstructured":"Arif, J. M., Ab Razak, M. F., Mat, S. R. T., Awang, S., Ismail, N. S. N., & Firdaus, A. (2021). Android mobile malware detection using fuzzy AHP. Journal of Information Security and Applications, 61, 102929.","journal-title":"Journal of Information Security and Applications"},{"issue":"1","key":"11128_CR11","doi-asserted-by":"publisher","first-page":"123","DOI":"10.3390\/sym15010123","volume":"15","author":"ES Alomari","year":"2023","unstructured":"Alomari, E. S., Nuiaa, R. R., Alyasseri, Z. A. A., Mohammed, H. J., Sani, N. S., Esa, M. I., & Musawi, B. A. (2023). Malware detection using deep learning and Correlation-Based feature selection. Symmetry, 15(1), 123.","journal-title":"Symmetry"},{"key":"11128_CR12","doi-asserted-by":"crossref","unstructured":"Alazab, M., & Khurma, R. A. (2023). Hybrid sand cat swarm optimization kernel extreme learning machines for android ransomware classification.","DOI":"10.21203\/rs.3.rs-2398917\/v1"},{"key":"11128_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102696","volume":"58","author":"A Mathur","year":"2021","unstructured":"Mathur, A., Podila, L. M., Kulkarni, K., Niyaz, Q., & Javaid, A. Y. (2021). NATICUSdroid: A malware detection framework for Android using native and custom permissions. Journal of Information Security and Applications, 58, 102696.","journal-title":"Journal of Information Security and Applications"},{"key":"11128_CR14","doi-asserted-by":"crossref","unstructured":"Adebayo, O. S., & Abdul Aziz, N. (2019). Improved malware detection model with apriori association rule and particle swarm optimization.\u00a0Security and Communication Networks.","DOI":"10.1155\/2019\/2850932"},{"key":"11128_CR15","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.jnca.2018.12.014","volume":"133","author":"S Wang","year":"2019","unstructured":"Wang, S., Chen, Z., Yan, Q., Yang, B., Peng, L., & Jia, Z. (2019). A mobile malware detection method using behavior features in network traffic. Journal of Network and Computer Applications, 133, 15\u201325.","journal-title":"Journal of Network and Computer Applications"},{"issue":"10","key":"11128_CR16","doi-asserted-by":"publisher","first-page":"326","DOI":"10.3390\/info10100326","volume":"10","author":"A Amin","year":"2019","unstructured":"Amin, A., Eldessouki, A., Magdy, M. T., Abdeen, N., Hindy, H., & Hegazy, I. (2019). Androshield: Automated android applications vulnerability detection, a hybrid static and dynamic analysis approach. Information, 10(10), 326.","journal-title":"Information"},{"key":"11128_CR17","doi-asserted-by":"crossref","unstructured":"Abdalla, P. A., & Varol, C. (2020). Testing IoT security: The case study of an ip camera. In\u00a02020 8th International Symposium on Digital Forensics and Security (ISDFS)\u00a0(pp. 1\u20135). IEEE.","DOI":"10.1109\/ISDFS49300.2020.9116392"},{"key":"11128_CR18","doi-asserted-by":"crossref","unstructured":"Dawoud, A., & Bugiel, S. (2021). Bringing balance to the force: Dynamic analysis of the android application framework. Bringing Balance to the Force: Dynamic Analysis of the Android Application Framework.","DOI":"10.14722\/ndss.2021.23106"},{"key":"11128_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102087","volume":"100","author":"S Garg","year":"2021","unstructured":"Garg, S., & Baliyan, N. (2021). Android security assessment: A review, taxonomy and research gap study. Computers & Security, 100, 102087.","journal-title":"Computers & Security"},{"key":"11128_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102483","volume":"54","author":"R Surendran","year":"2020","unstructured":"Surendran, R., Thomas, T., & Emmanuel, S. (2020). A TAN based hybrid model for android malware detection. Journal of Information Security and Applications, 54, 102483.","journal-title":"Journal of Information Security and Applications"},{"issue":"5\u20136","key":"11128_CR21","doi-asserted-by":"publisher","first-page":"2104","DOI":"10.1166\/jctn.2019.7856","volume":"16","author":"VR Niveditha","year":"2019","unstructured":"Niveditha, V. R., & Ananthan, T. V. (2019). Improving acknowledgement in android application. Journal of Computational and Theoretical Nanoscience, 16(5\u20136), 2104\u20132107.","journal-title":"Journal of Computational and Theoretical Nanoscience"},{"issue":"3","key":"11128_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439802","volume":"24","author":"AS Ami","year":"2021","unstructured":"Ami, A. S., Kafle, K., Moran, K., Nadkarni, A., & Poshyvanyk, D. (2021). Systematic mutation-based evaluation of the soundness of security-focused android static analysis techniques. ACM Transactions on Privacy and Security (TOPS), 24(3), 1\u201337.","journal-title":"ACM Transactions on Privacy and Security (TOPS)"},{"key":"11128_CR23","doi-asserted-by":"crossref","unstructured":"Nirumand, A., Zamani, B., & Tork Ladani, B. (2019). VAnDroid: a framework for vulnerability analysis of Android applications using a model\u2010driven reverse engineering technique. Software: Practice and Experience, 49(1), 70\u201399.","DOI":"10.1002\/spe.2643"},{"key":"11128_CR24","doi-asserted-by":"crossref","unstructured":"Druffel, A., & Heid, K. (2020). Davinci: Android app analysis beyond frida via dynamic system call instrumentation. In Applied Cryptography and Network Security Workshops: ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19\u201322, 2020, Proceedings 18 (pp. 473\u2013489). Springer International Publishing.","DOI":"10.1007\/978-3-030-61638-0_26"},{"key":"11128_CR25","doi-asserted-by":"publisher","first-page":"59951","DOI":"10.1109\/ACCESS.2019.2915339","volume":"7","author":"X Huang","year":"2019","unstructured":"Huang, X., Zhou, A., Jia, P., Liu, L., & Liu, L. (2019). Fuzzing the android applications with http\/https network data. IEEE Access, 7, 59951\u201359962.","journal-title":"IEEE Access"},{"issue":"1","key":"11128_CR26","doi-asserted-by":"publisher","first-page":"406","DOI":"10.3390\/molecules28010406","volume":"28","author":"H Zhang","year":"2023","unstructured":"Zhang, H., Tan, H., Lin, B., Yang, X., Sun, Z., Zhong, L., & Zang, H. (2023). Improved Principal Component Analysis (IPCA): a novel method for quantitative calibration transfer between different Near-Infrared spectrometers. Molecules, 28(1), 406.","journal-title":"Molecules"},{"key":"11128_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2021.118069","volume":"306","author":"S Ferahtia","year":"2022","unstructured":"Ferahtia, S., Rezk, H., Abdelkareem, M. A., & Olabi, A. G. (2022). Optimal techno-economic energy management strategy for building\u2019s microgrids based bald eagle search optimization algorithm. Applied Energy, 306, 118069.","journal-title":"Applied Energy"},{"issue":"1","key":"11128_CR28","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.jeconom.2022.04.007","volume":"235","author":"X Zhang","year":"2023","unstructured":"Zhang, X., & Liu, C. A. (2023). Model averaging prediction by K-fold cross-validation. Journal of Econometrics, 235(1), 280\u2013301.","journal-title":"Journal of Econometrics"},{"issue":"1","key":"11128_CR29","first-page":"19","volume":"1","author":"E G\u00fcven\u00e7","year":"2021","unstructured":"G\u00fcven\u00e7, E., \u00c7etin, G., & Ko\u00e7ak, H. (2021). Comparison of KNN and DNN classifiers performance in predicting mobile phone price ranges. Advances in Artificial Intelligence Research, 1(1), 19\u201328.","journal-title":"Advances in Artificial Intelligence Research"},{"issue":"3","key":"11128_CR30","doi-asserted-by":"publisher","first-page":"950","DOI":"10.3390\/app12030950","volume":"12","author":"H Salem","year":"2022","unstructured":"Salem, H., Shams, M. Y., Elzeki, O. M., Abd Elfattah, M., Al-Amri, F., & J., & Elnazer, S. (2022). Fine-tuning fuzzy KNN classifier based on uncertainty membership for the medical diagnosis of diabetes. Applied Sciences, 12(3), 950.","journal-title":"Applied Sciences"},{"key":"11128_CR31","unstructured":"Dataset1:https:\/\/www.unb.ca\/cic\/datasets\/andmal2017.html"},{"key":"11128_CR32","unstructured":"Dataset2:https:\/\/github.com\/mesibo\/messenger-app-android\/blob\/master\/app\/src\/main\/AndroidManifest.xml"},{"key":"11128_CR33","unstructured":"Dataset3:https:\/\/github.com\/GetStream\/WhatsApp-CloneAndroid\/blob\/master\/app\/src\/main\/AndroidManifest.xml"},{"key":"11128_CR34","unstructured":"Dataset4:https:\/\/github.com\/DrKLO\/Telegram\/blob\/master\/TMessagesProj\/src\/main\/AndroidManifest.xml"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11128-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-024-11128-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11128-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T12:26:17Z","timestamp":1715603177000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-024-11128-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":34,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["11128"],"URL":"https:\/\/doi.org\/10.1007\/s11277-024-11128-w","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2024,3]]},"assertion":[{"value":"17 April 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declared that they have no conflicts of interest to this work. We declare that we do not have any commercial or associative interest that represents a conflict of interest in connection with the work submitted.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"This article is a completely original work of its authors; it has not been published before and will not be sent to other publications until the journal\u2019s editorial board decides not to accept it for publication.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}]}}