{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T00:11:46Z","timestamp":1760746306346,"version":"build-2065373602"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,8,11]],"date-time":"2025-08-11T00:00:00Z","timestamp":1754870400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,11]],"date-time":"2025-08-11T00:00:00Z","timestamp":1754870400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s12083-025-02069-7","type":"journal-article","created":{"date-parts":[[2025,8,11]],"date-time":"2025-08-11T12:54:11Z","timestamp":1754916851000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["EML-AMD: an explainable machine learning framework for adaptive android malware detection"],"prefix":"10.1007","volume":"18","author":[{"given":"Aakansha","family":"Patel","sequence":"first","affiliation":[]},{"given":"Samarendra Mohan","family":"Ghosh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,11]]},"reference":[{"key":"2069_CR1","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1109\/AIC57670.2023.10263974","volume":"2023","author":"SK Smmarwar","year":"2023","unstructured":"Smmarwar SK, Gupta GP, Kumar S (2023) XAI-AMD-DL: An explainable AI approach for android malware detection system using deep learning. Proc 2023 IEEE World Conf Appl Intell Comput AIC 2023:423\u2013428. https:\/\/doi.org\/10.1109\/AIC57670.2023.10263974","journal-title":"Proc 2023 IEEE World Conf Appl Intell Comput AIC"},{"key":"2069_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.seta.2022.102852","volume":"54","author":"SK Smmarwar","year":"2022","unstructured":"Smmarwar SK, Gupta GP, Kumar S, Kumar P (2022) An optimized and efficient android malware detection framework for future sustainable computing. Sustain Energy Technol Assessments 54:102852. https:\/\/doi.org\/10.1016\/j.seta.2022.102852","journal-title":"Sustain Energy Technol Assessments"},{"key":"2069_CR3","unstructured":"Coker J (2024) Malware Attacks Surge 30% in First Half of 2024. Deputy Editor, Infosecurity Magazine. https:\/\/www.infosecurity-magazine.com\/news\/malware-attacks-surge-30-per-cent\/ (Accessed 06 Aug. 2024)"},{"key":"2069_CR4","doi-asserted-by":"publisher","first-page":"2024","DOI":"10.1016\/j.cose.2023.103651","volume":"137","author":"H Yang","year":"2023","unstructured":"Yang H, Wang Y, Zhang L, Cheng X, Hu Z (2023) A novel Android malware detection method with API semantics extraction. Comput Secur 137:2024. https:\/\/doi.org\/10.1016\/j.cose.2023.103651","journal-title":"Comput Secur"},{"key":"2069_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108410","volume":"104","author":"SK Smmarwar","year":"2022","unstructured":"Smmarwar SK, Gupta GP, Kumar S (2022) Deep malware detection framework for IoT-based smart agriculture. Comput Electr Eng 104:108410. https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108410","journal-title":"Comput Electr Eng"},{"key":"2069_CR6","doi-asserted-by":"publisher","unstructured":"Smmarwar SK, Gupta GP, Kumar S (2021) Research trends for malware and intrusion detection on network systems. 19\u201340. https:\/\/doi.org\/10.4018\/978-1-7998-7789-9.ch002.","DOI":"10.4018\/978-1-7998-7789-9.ch002"},{"key":"2069_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108731","volume":"108","author":"SK Smmarwar","year":"2023","unstructured":"Smmarwar SK, Gupta GP, Kumar S (2023) Ai-empowered malware detection system for industrial internet of things. Comput Electr Eng 108:108731. https:\/\/doi.org\/10.1016\/j.compeleceng.2023.108731","journal-title":"Comput Electr Eng"},{"key":"2069_CR8","doi-asserted-by":"publisher","unstructured":"Smmarwar SK, Gupta GP, Kumar S (2024) Malware detection framework based on iterative neighborhood component analysis for internet of medical things. vol. 2003 CCIS. Springer Nature Switzerland. https:\/\/doi.org\/10.1007\/978-3-031-54547-4_8.","DOI":"10.1007\/978-3-031-54547-4_8"},{"key":"2069_CR9","doi-asserted-by":"publisher","unstructured":"Smmarwar SK, Gupta GP, Kumar S (2021) Design of a fused triple convolutional neural network for malware detection: a visual classification approach. In: Singh M, Tyagi V, Gupta PK, Flusser J, \u00d6ren T, Sonawane VR (eds) Advances in computing and data sciences. ICACDS 2021. Communications in computer and information science, vol 1440. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-81462-5_26","DOI":"10.1007\/978-3-030-81462-5_26"},{"key":"2069_CR10","doi-asserted-by":"publisher","unstructured":"\u015eahin D\u00d6, Kural OE, Akleylek S, K\u0131l\u0131\u00e7 E (2021) A novel permission-based Android malware detection system using feature selection based on linear regression. Neural Comput Appl 1, https:\/\/doi.org\/10.1007\/s00521-021-05875-1.","DOI":"10.1007\/s00521-021-05875-1"},{"key":"2069_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.teler.2024.100130","volume":"14","author":"SK Smmarwar","year":"2024","unstructured":"Smmarwar SK, Gupta GP, Kumar S (2024) Android malware detection and identification frameworks by leveraging the machine and deep learning techniques: a comprehensive review. Telemat Inform Rep 14:100130. https:\/\/doi.org\/10.1016\/j.teler.2024.100130","journal-title":"Telemat Inform Rep"},{"key":"2069_CR12","doi-asserted-by":"publisher","unstructured":"Smmarwar SK, Gupta GP, Kumar S (2021) A study on data sharing using blockchain system and its challenges and applications. 199\u2013218, https:\/\/doi.org\/10.4018\/978-1-7998-7789-9.ch011","DOI":"10.4018\/978-1-7998-7789-9.ch011"},{"key":"2069_CR13","unstructured":"Krishna A, Smmarwar S, Meena J, Bag M, Singh V (2011) Insider threat: a potential challenges for the information security domain. Int J Business Strateg Manag, pp 1\u20138"},{"key":"2069_CR14","doi-asserted-by":"publisher","first-page":"123109","DOI":"10.1016\/j.eswa.2023.123109","volume":"246","author":"T Li","year":"2024","unstructured":"Li T et al (2024) A malware detection model based on imbalanced heterogeneous graph embeddings. Expert Syst Appl 246:123109. https:\/\/doi.org\/10.1016\/j.eswa.2023.123109","journal-title":"Expert Syst Appl"},{"issue":"1","key":"2069_CR15","doi-asserted-by":"publisher","first-page":"4197","DOI":"10.1109\/TCE.2024.3367330","volume":"70","author":"D jo Kim","year":"2024","unstructured":"jo Kim D, Bhuvaneswari BA, Sarveshwaran V (2024) A novel split learning based consumer electronics network traffic anomaly detection framework for Smart City environment. IEEE Trans Consum Electron 70(1):4197\u20134204. https:\/\/doi.org\/10.1109\/TCE.2024.3367330","journal-title":"IEEE Trans Consum Electron"},{"key":"2069_CR16","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1109\/CCWC.2019.8666450","volume":"2019","author":"I Alrashdi","year":"2019","unstructured":"Alrashdi I, Alqazzaz A, Aloufi E, Alharthi R, Zohdy M, Ming H (2019) \u201cAD-IoT: Anomaly detection of IoT cyberattacks in smart city using machine learning\u201d, 2019 IEEE 9th Annu. Comput Commun Work Conf CCWC 2019:305\u2013310. https:\/\/doi.org\/10.1109\/CCWC.2019.8666450","journal-title":"Comput Commun Work Conf CCWC"},{"key":"2069_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.110781","volume":"276","author":"Y Jia","year":"2023","unstructured":"Jia Y et al (2023) Artificial intelligence enabled cyber security defense for smart cities: A novel attack detection framework based on the MDATA model. Knowledge-Based Syst 276:110781. https:\/\/doi.org\/10.1016\/j.knosys.2023.110781","journal-title":"Knowledge-Based Syst"},{"key":"2069_CR18","doi-asserted-by":"publisher","first-page":"2021","DOI":"10.1016\/j.scs.2020.102655","volume":"66","author":"D Chen","year":"2020","unstructured":"Chen D, Wawrzynski P, Lv Z (2020) Cyber security in smart cities: a review of deep learning-based applications and case studies. Sustain Cities Soc 66:2021. https:\/\/doi.org\/10.1016\/j.scs.2020.102655","journal-title":"Sustain Cities Soc"},{"key":"2069_CR19","doi-asserted-by":"publisher","unstructured":"Aurangzeb S, Aleem M, Khan MT, Anwar H, Siddique MS (2023) Cybersecurity for autonomous vehicles against malware attacks in smart-cities. Cluster Comput 7.\u00a0https:\/\/doi.org\/10.1007\/s10586-023-04114-7.","DOI":"10.1007\/s10586-023-04114-7"},{"key":"2069_CR20","doi-asserted-by":"publisher","first-page":"200318","DOI":"10.1016\/j.iswa.2023.200318","volume":"21","author":"AR Nasser","year":"2024","unstructured":"Nasser AR, Hasan AM, Humaidi AJ (2024) AMDet DL: deep learning-based malware detector for android. Intell Syst with Appl 21:200318. https:\/\/doi.org\/10.1016\/j.iswa.2023.200318","journal-title":"Intell Syst with Appl"},{"issue":"2","key":"2069_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/electronics13020359","volume":"13","author":"W Guo","year":"2024","unstructured":"Guo W et al (2024) MalOSDF: an opcode slice-based malware detection framework using active and ensemble learning. Electron 13(2):1\u201319. https:\/\/doi.org\/10.3390\/electronics13020359","journal-title":"Electron"},{"key":"2069_CR22","doi-asserted-by":"publisher","first-page":"106825","DOI":"10.1016\/j.compeleceng.2020.106825","volume":"88","author":"SMH Fard","year":"2020","unstructured":"Fard SMH, Karimimpour H, Dehghantanha A, Jahromi AN, Srivastava G (2020) Ensemble sparse representation-based cyber threat hunting for security of smart cities. Comput Electr Eng 88:106825. https:\/\/doi.org\/10.1016\/j.compeleceng.2020.106825","journal-title":"Comput Electr Eng"},{"key":"2069_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103846","volume":"141","author":"L Shen","year":"2024","unstructured":"Shen L, Fang M, Xu J (2024) GHGDroid: Global heterogeneous graph-based android malware detection. Comput Secur 141:103846. https:\/\/doi.org\/10.1016\/j.cose.2024.103846","journal-title":"Comput Secur"},{"key":"2069_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2024.104866","volume":"188","author":"MM Alani","year":"2024","unstructured":"Alani MM (2024) Honeytwin: securing smart cities with machine learning-enabled SDN edge and cloud-based honeypots. J Parallel Distrib Comput 188:104866. https:\/\/doi.org\/10.1016\/j.jpdc.2024.104866","journal-title":"J Parallel Distrib Comput"},{"key":"2069_CR25","doi-asserted-by":"publisher","unstructured":"Shafin SS, Karmakar G, Mareels I (2023) Obfuscated memory malware detection in resource-constrained IoT devices for smart city applications. Sensors 23:5348. https:\/\/doi.org\/10.3390\/s23115348","DOI":"10.3390\/s23115348"},{"issue":"5","key":"2069_CR26","doi-asserted-by":"publisher","first-page":"7744","DOI":"10.1109\/TII.2024.3363016","volume":"20","author":"S Dong","year":"2024","unstructured":"Dong S, Shu L, Nie S (2024) Android malware detection method based on CNN and DNN bybrid mechanism. IEEE Trans Ind Informatics 20(5):7744\u20137753. https:\/\/doi.org\/10.1109\/TII.2024.3363016","journal-title":"IEEE Trans Ind Informatics"},{"issue":"5","key":"2069_CR27","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1109\/TETCI.2023.3281833","volume":"7","author":"L Shu","year":"2023","unstructured":"Shu L, Dong S, Su H, Huang J (2023) Android malware detection methods based on convolutional neural network: a survey. IEEE Trans Emerg Top Comput Intell 7(5):1330\u20131350. https:\/\/doi.org\/10.1109\/TETCI.2023.3281833","journal-title":"IEEE Trans Emerg Top Comput Intell"},{"key":"2069_CR28","doi-asserted-by":"publisher","unstructured":"Azeem MZ, Imran A, Akhtar F, Wajahat A, Latif J, Memon SA (2020) Effects of code cloning in mobile applications. 2020 3rd Int. Conf. Comput. Math. Eng. Technol. Idea to Innov. Build. Knowl. Econ. iCoMET 2020, https:\/\/doi.org\/10.1109\/iCoMET48670.2020.9073872","DOI":"10.1109\/iCoMET48670.2020.9073872"},{"key":"2069_CR29","doi-asserted-by":"publisher","unstructured":"Qureshi S, Li J, Akhtar F, Tunio S, Khand ZH, Wajahat A (2021) Analysis of challenges in modern network forensic framework. Secur Commun Networks 2021. https:\/\/doi.org\/10.1155\/2021\/8871230.","DOI":"10.1155\/2021\/8871230"},{"issue":"1","key":"2069_CR30","doi-asserted-by":"publisher","first-page":"33","DOI":"10.3233\/IDT-230284","volume":"18","author":"A Wajahat","year":"2024","unstructured":"Wajahat A et al (2024) An effective deep learning scheme for android malware detection leveraging performance metrics and computational resources. Intell Decis Technol 18(1):33\u201355. https:\/\/doi.org\/10.3233\/IDT-230284","journal-title":"Intell Decis Technol"},{"key":"2069_CR31","doi-asserted-by":"publisher","first-page":"100464","DOI":"10.1016\/j.suscom.2020.100464","volume":"28","author":"G Nhu","year":"2020","unstructured":"Nhu G, Ho N, Viet L, Saviour AF, Gobi R, Shankar K (2020) Sustainable computing: informatics and systems blockchain enabled energy efficient red deer algorithm based clustering protocol for pervasive wireless sensor networks. Sustain Comput Informatics Syst 28:100464. https:\/\/doi.org\/10.1016\/j.suscom.2020.100464","journal-title":"Sustain Comput Informatics Syst"},{"key":"2069_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103591","volume":"213","author":"O Gulec","year":"2023","unstructured":"Gulec O, Sahin E (2023) Red deer algorithm based nano-sensor node clustering for IoNT. J Netw Comput Appl 213:103591. https:\/\/doi.org\/10.1016\/j.jnca.2023.103591","journal-title":"J Netw Comput Appl"},{"key":"2069_CR33","doi-asserted-by":"publisher","unstructured":"Bekta Y (2022) ScienceDirect red deer algorithm based selective harmonic elimination for renewable energy application with unequal DC sources. 8:588\u2013596, https:\/\/doi.org\/10.1016\/j.egyr.2022.05.209.","DOI":"10.1016\/j.egyr.2022.05.209"},{"key":"2069_CR34","doi-asserted-by":"crossref","unstructured":"Banerjee D, Chatterjee B, Bhowal P, Bhattacharyya T, Malakar S, Sarkar R (2021) A new wrapper feature selection method for language-invariant offline signature verification.\u00a0Expert Syst Appl 186:115756","DOI":"10.1016\/j.eswa.2021.115756"},{"key":"2069_CR35","doi-asserted-by":"publisher","first-page":"1882","DOI":"10.1016\/j.matpr.2021.12.527","volume":"60","author":"AM Tadkal","year":"2022","unstructured":"Tadkal AM, Mallapur SV (2022) Materials Today\u202f: Proceedings Red deer optimization algorithm inspired clustering-based routing protocol for reliable data dissemination in FANETs. Mater Today Proc 60:1882\u20131889. https:\/\/doi.org\/10.1016\/j.matpr.2021.12.527","journal-title":"Mater Today Proc"},{"key":"2069_CR36","doi-asserted-by":"publisher","first-page":"108492","DOI":"10.1016\/j.compeleceng.2022.108492","volume":"105","author":"SRG Reddy","year":"2023","unstructured":"Reddy SRG, Varma GPS, Lakshmi R (2023) Resnet-based modified red deer optimization with DLCNN classifier for plant disease identification and classification. Comput Electr Eng 105:108492. https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108492","journal-title":"Comput Electr Eng"},{"key":"2069_CR37","doi-asserted-by":"crossref","unstructured":"Dey S, De S, Deb A, Debnath S (2021) Multilevel image segmentation using modified red deer algorithm. In 202111th international conference on cloud computing, data science & engineering (Confluence).\u00a0IEEE, pp 362\u2013368","DOI":"10.1109\/Confluence51648.2021.9377112"},{"issue":"19","key":"2069_CR38","doi-asserted-by":"publisher","first-page":"14637","DOI":"10.1007\/s00500-020-04812-z","volume":"24","author":"A Mohammad","year":"2020","unstructured":"Mohammad A, Reza FMH (2020) Red deer algorithm (RDA): a new nature-inspired meta-heuristic. Soft Comput 24(19):14637\u201314665. https:\/\/doi.org\/10.1007\/s00500-020-04812-z","journal-title":"Soft Comput"},{"key":"2069_CR39","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/978-981-16-8664-1_30","volume":"370","author":"SK Smmarwar","year":"2022","unstructured":"Smmarwar SK, Gupta GP, Kumar S (2022) A hybrid feature selection approach-based Android malware detection framework using machine learning techniques. Lect Notes Networks Syst 370:347\u2013356. https:\/\/doi.org\/10.1007\/978-981-16-8664-1_30","journal-title":"Lect Notes Networks Syst"},{"key":"2069_CR40","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1016\/j.procs.2023.01.014","volume":"218","author":"AK Dey","year":"2023","unstructured":"Dey AK, Gupta GP, Sahu SP (2023) Hybrid meta-heuristic based feature selection mechanism for cyber-attack detection in IoT-enabled networks. Procedia Comput Sci 218:318\u2013327. https:\/\/doi.org\/10.1016\/j.procs.2023.01.014","journal-title":"Procedia Comput Sci"},{"issue":"4","key":"2069_CR41","doi-asserted-by":"publisher","first-page":"3749","DOI":"10.1007\/s13369-020-05181-3","volume":"46","author":"P Kumar","year":"2021","unstructured":"Kumar P, Gupta GP, Tripathi R (2021) Toward design of an intelligent cyber attack detection system using hybrid feature reduced approach for IoT networks. Arab J Sci Eng 46(4):3749\u20133778. https:\/\/doi.org\/10.1007\/s13369-020-05181-3","journal-title":"Arab J Sci Eng"},{"key":"2069_CR42","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.undsp.2024.03.004","volume":"19","author":"P Xiao","year":"2024","unstructured":"Xiao P, Liu Z, Zhao G, Pan P (2024) Novel stacking models based on SMOTE for the prediction of rockburst grades at four deep gold mines. Undergr Sp 19:169\u2013188. https:\/\/doi.org\/10.1016\/j.undsp.2024.03.004","journal-title":"Undergr Sp"},{"key":"2069_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118515","volume":"210","author":"P Moghadam","year":"2022","unstructured":"Moghadam P, Ahmadi A (2022) A machine learning framework to predict kidney graft failure with class imbalance using red deer algorithm. Expert Syst Appl 210:118515. https:\/\/doi.org\/10.1016\/j.eswa.2022.118515","journal-title":"Expert Syst Appl"},{"key":"2069_CR44","doi-asserted-by":"publisher","first-page":"100102","DOI":"10.1016\/j.health.2022.100102","volume":"2","author":"S Sreejith","year":"2022","unstructured":"Sreejith S, Nehemiah HK, Kannan A (2022) Healthcare analytics a clinical decision support system for polycystic ovarian syndrome using red deer algorithm and random forest classifier. Healthc Anal 2:100102. https:\/\/doi.org\/10.1016\/j.health.2022.100102","journal-title":"Healthc Anal"},{"key":"2069_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.seta.2022.102852","volume":"54","author":"SK Smmarwar","year":"2022","unstructured":"Smmarwar SK, Gupta GP, Kumar S, Kumar P (2022) An optimized and efficient android malware detection framework for future sustainable computing. Sustain Energy Technol Assessments 54:102852. https:\/\/doi.org\/10.1016\/j.seta.2022.102852","journal-title":"Sustain Energy Technol Assessments"},{"key":"2069_CR46","doi-asserted-by":"publisher","unstructured":"Kamboj A, Kumar P, Bairwa AK, Joshi S (2022) Detection of malware in downloaded files using various machine learning models. Egypt Inform J.\u00a0https:\/\/doi.org\/10.1016\/j.eij.2022.12.002.","DOI":"10.1016\/j.eij.2022.12.002"},{"issue":"10","key":"2069_CR47","doi-asserted-by":"publisher","first-page":"9555","DOI":"10.1007\/s12652-020-02696-3","volume":"12","author":"P Kumar","year":"2021","unstructured":"Kumar P, Gupta GP, Tripathi R (2021) A distributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks. J Ambient Intell Humaniz Comput 12(10):9555\u20139572. https:\/\/doi.org\/10.1007\/s12652-020-02696-3","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"2069_CR48","doi-asserted-by":"publisher","first-page":"110273","DOI":"10.1016\/j.knosys.2023.110273","volume":"263","author":"W Saeed","year":"2023","unstructured":"Saeed W, Omlin C (2023) Explainable AI (XAI): a systematic meta-survey of current challenges and future opportunities. Knowledge-Based Syst 263:110273. https:\/\/doi.org\/10.1016\/j.knosys.2023.110273","journal-title":"Knowledge-Based Syst"},{"key":"2069_CR49","doi-asserted-by":"publisher","first-page":"115736","DOI":"10.1016\/j.eswa.2021.115736","volume":"186","author":"L Antwarg","year":"2021","unstructured":"Antwarg L, Miller RM, Shapira B, Rokach L (2021) Explaining anomalies detected by autoencoders using Shapley Additive Explanations[Formula presented]. Expert Syst Appl 186:115736. https:\/\/doi.org\/10.1016\/j.eswa.2021.115736","journal-title":"Expert Syst Appl"},{"key":"2069_CR50","unstructured":"Canadian Institute for Cybersecurity (2020) Android malware dataset (CICMalDroid 2020). https:\/\/www.unb.ca\/cic\/datasets\/maldroid-2020.html. Accessed 31 Jul 2024"},{"key":"2069_CR51","doi-asserted-by":"publisher","unstructured":"Mahdavifar S, Alhadidi D, Ghorbani AA (2022) Effective and efficient hybrid android malware classification using pseudo-label stacked auto-encoder 30(1). Springer US. https:\/\/doi.org\/10.1007\/s10922-021-09634-4.","DOI":"10.1007\/s10922-021-09634-4"},{"key":"2069_CR52","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102915","volume":"123","author":"S Yang","year":"2022","unstructured":"Yang S, Wang Y, Xu H, Xu F, Chen M (2022) An android malware detection and classification approach based on contrastive lerning. Comput Secur 123:102915. https:\/\/doi.org\/10.1016\/j.cose.2022.102915","journal-title":"Comput Secur"},{"key":"2069_CR53","doi-asserted-by":"publisher","unstructured":"Tarwireyi P, Terzoli A, Adigun MO (2023) Using multi-audio feature fusion for android malware detection. Comput Secur 131 https:\/\/doi.org\/10.1016\/j.cose.2023.103282","DOI":"10.1016\/j.cose.2023.103282"},{"key":"2069_CR54","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103523","volume":"161","author":"F Nawshin","year":"2024","unstructured":"Nawshin F, Unal D, Hammoudeh M, Suganthan PN (2024) AI-powered malware detection with differential privacy for zero trust security in internet of things networks. Ad Hoc Netw 161:103523. https:\/\/doi.org\/10.1016\/j.adhoc.2024.103523","journal-title":"Ad Hoc Netw"},{"key":"2069_CR55","doi-asserted-by":"publisher","first-page":"103721","DOI":"10.1016\/j.jisa.2024.103721","volume":"82","author":"J Tang","year":"2024","unstructured":"Tang J et al (2024) Android malware detection based on a novel mixed bytecode image combined with attention mechanism. J Inf Secur Appl 82:103721. https:\/\/doi.org\/10.1016\/j.jisa.2024.103721","journal-title":"J Inf Secur Appl"},{"issue":"1","key":"2069_CR56","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.iot.2024.101320","volume":"090","author":"VCML Shamsher Ullah","year":"2008","unstructured":"Shamsher Ullah VCML, Li J, Ullah F, Chen J, Ali I, Khan S, Ahad A (2008) The revolution and vision of explainable AI for android malware detection and protection. Int Things 090(1):1\u201310. https:\/\/doi.org\/10.1016\/j.iot.2024.101320","journal-title":"Int Things"},{"key":"2069_CR57","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.aej.2024.11.068","volume":"114","author":"J Feng","year":"2025","unstructured":"Feng J, Shen L, Chen Z, Lei Y, Li H (2025) HGdetector: a hybrid android malware detection method using network traffic and function call graph. Alexandria Eng J 114:30\u201345. https:\/\/doi.org\/10.1016\/j.aej.2024.11.068","journal-title":"Alexandria Eng J"},{"key":"2069_CR58","doi-asserted-by":"publisher","unstructured":"Matsobane NO (2024) Malware detection using random forest method trained on a balanced synthetic dataset (Doctoraldissertation). https:\/\/doi.org\/10.54327\/set2025\/v5.i1.167","DOI":"10.54327\/set2025\/v5.i1.167"},{"key":"2069_CR59","doi-asserted-by":"publisher","first-page":"104035","DOI":"10.1016\/j.jnca.2024.104035","volume":"233","author":"KA Asmitha","year":"2025","unstructured":"Asmitha KA, Vinod P, Rafidha RR, Raveendran N, Conti M (2025) Android malware defense through a hybrid multi-modal approach. J Netw Comput Appl 233:104035. https:\/\/doi.org\/10.1016\/j.jnca.2024.104035","journal-title":"J Netw Comput Appl"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02069-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02069-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02069-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T06:39:34Z","timestamp":1760683174000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02069-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,11]]},"references-count":59,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["2069"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02069-7","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,8,11]]},"assertion":[{"value":"5 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human or animal rights"}}],"article-number":"264"}}