{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:22:20Z","timestamp":1774369340577,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,12,12]],"date-time":"2023-12-12T00:00:00Z","timestamp":1702339200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,12]],"date-time":"2023-12-12T00:00:00Z","timestamp":1702339200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-023-02411-x","type":"journal-article","created":{"date-parts":[[2023,12,12]],"date-time":"2023-12-12T13:03:43Z","timestamp":1702386223000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Security Testing of Android Apps Using Malware Analysis and XGboost Optimized by Adaptive Particle Swarm Optimization"],"prefix":"10.1007","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3582-0266","authenticated-orcid":false,"given":"Pawan","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Sukhdip","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,12]]},"reference":[{"key":"2411_CR1","unstructured":"Statcounter: mobile operating system market share worldwide. https:\/\/gs.statcounter.com\/os-market-share\/mobile\/worldwide. Accessed Sep 01, 2022 (2023)"},{"key":"2411_CR2","unstructured":"Google: Android Apps on Google Play. https:\/\/play.google.com\/store\/apps. Accessed Sep 01, 2022 (2023)"},{"issue":"10","key":"2411_CR3","doi-asserted-by":"publisher","first-page":"2032","DOI":"10.1109\/TSE.2019.2941936","volume":"47","author":"GL Scoccia","year":"2021","unstructured":"Scoccia GL, Malavolta I, Autili M, Di Salle A, Inverardi P. Enhancing trustability of android applications via user-centric flexible permissions. IEEE Trans Softw Eng. 2021;47(10):2032\u201351. https:\/\/doi.org\/10.1109\/TSE.2019.2941936.","journal-title":"IEEE Trans Softw Eng"},{"key":"2411_CR4","doi-asserted-by":"publisher","first-page":"124579","DOI":"10.1109\/ACCESS.2020.3006143","volume":"8","author":"K Liu","year":"2020","unstructured":"Liu K, Xu S, Xu G, Zhang M, Sun D, Liu H. A review of android malware detection approaches based on machine learning. IEEE Access. 2020;8:124579\u2013607. https:\/\/doi.org\/10.1109\/ACCESS.2020.3006143.","journal-title":"IEEE Access"},{"issue":"11","key":"2411_CR5","doi-asserted-by":"publisher","first-page":"1054","DOI":"10.1109\/TSE.2016.2547385","volume":"42","author":"T Wu","year":"2016","unstructured":"Wu T, Liu J, Xu Z, Guo C, Zhang Y, Yan J, Zhang J. Light-weight, inter-procedural and callback-aware resource leak detection for android apps. IEEE Trans Softw Eng. 2016;42(11):1054\u201376. https:\/\/doi.org\/10.1109\/TSE.2016.2547385.","journal-title":"IEEE Trans Softw Eng"},{"key":"2411_CR6","doi-asserted-by":"publisher","unstructured":"Wu D-J, Mao C-H, Wei T-E, Lee H-M, Wu K-P. Droidmat: Android malware detection through manifest and API calls tracing. In: 2012 Seventh Asia Joint Conference on Information Security, 2012;62\u20139. https:\/\/doi.org\/10.1109\/AsiaJCIS.2012.18","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"2411_CR7","doi-asserted-by":"crossref","unstructured":"Arp D, Spreitzenbarth M, Hubner M, Gascon H, Rieck K. Drebin: effective and explainable detection of android malware in your pocket. In: Network and Distributed System Security Symposium 2014.","DOI":"10.14722\/ndss.2014.23247"},{"issue":"11","key":"2411_CR8","doi-asserted-by":"publisher","first-page":"1869","DOI":"10.1109\/TIFS.2014.2353996","volume":"9","author":"W Wang","year":"2014","unstructured":"Wang W, Wang X, Feng D, Liu J, Han Z, Zhang X. Exploring permission-induced risk in android applications for malicious application detection. IEEE Trans Inf Forensics Secur. 2014;9(11):1869\u201382. https:\/\/doi.org\/10.1109\/TIFS.2014.2353996.","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"2411_CR9","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1109\/TDSC.2014.2355839","volume":"12","author":"L Cen","year":"2015","unstructured":"Cen L, Gates CS, Si L, Li N. A probabilistic discriminative model for android malware detection with decompiled source code. IEEE Trans Dependable Secure Comput. 2015;12(4):400\u201312. https:\/\/doi.org\/10.1109\/TDSC.2014.2355839.","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"2411_CR10","doi-asserted-by":"publisher","unstructured":"Kang B, Yerima SY, Sezer S, McLaughlin K. N-gram Opcode Analysis for Android Malware Detection. arXiv. 2016. https:\/\/doi.org\/10.48550\/arXiv.1612.01445. http:\/\/arxiv.org\/abs\/1612.01445.","DOI":"10.48550\/arXiv.1612.01445"},{"key":"2411_CR11","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.infsof.2016.03.004","volume":"75","author":"S Wu","year":"2016","unstructured":"Wu S, Wang P, Li X, Zhang Y. Effective detection of android malware based on the usage of data flow APIs and machine learning. Inf Softw Technol. 2016;75:17\u201325. https:\/\/doi.org\/10.1016\/j.infsof.2016.03.004.","journal-title":"Inf Softw Technol"},{"issue":"2","key":"2411_CR12","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s11416-016-0277-z","volume":"13","author":"MV Varsha","year":"2017","unstructured":"Varsha MV, Vinod P, Dhanya KA. Identification of malicious android app using manifest and opcode features. J Comput Virol Hack Techniq. 2017;13(2):125\u201338. https:\/\/doi.org\/10.1007\/s11416-016-0277-z. (Accessed 2023-06-29).","journal-title":"J Comput Virol Hack Techniq."},{"key":"2411_CR13","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.cose.2016.11.007","volume":"65","author":"A Feizollah","year":"2017","unstructured":"Feizollah A, Anuar NB, Salleh R, Suarez-Tangil G, Furnell S. Androdialysis: analysis of android intent effectiveness in malware detection. Comput Secur. 2017;65:121\u201334. https:\/\/doi.org\/10.1016\/j.cose.2016.11.007.","journal-title":"Comput Secur"},{"issue":"8","key":"2411_CR14","doi-asserted-by":"publisher","first-page":"1772","DOI":"10.1109\/TIFS.2017.2687880","volume":"12","author":"M Fan","year":"2017","unstructured":"Fan M, Liu J, Wang W, Li H, Tian Z, Liu T. Dapasa: detecting android piggybacked apps through sensitive subgraph analysis. IEEE Trans Inf Forensics Secur. 2017;12(8):1772\u201385. https:\/\/doi.org\/10.1109\/TIFS.2017.2687880.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2411_CR15","doi-asserted-by":"publisher","first-page":"4321","DOI":"10.1109\/ACCESS.2018.2792941","volume":"6","author":"S Arshad","year":"2018","unstructured":"Arshad S, Shah MA, Wahid A, Mehmood A, Song H, Yu H. Samadroid: a novel 3-level hybrid malware detection model for android operating system. IEEE Access. 2018;6:4321\u201339. https:\/\/doi.org\/10.1109\/ACCESS.2018.2792941.","journal-title":"IEEE Access"},{"key":"2411_CR16","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1016\/j.neucom.2017.07.030","volume":"272","author":"H-J Zhu","year":"2018","unstructured":"Zhu H-J, You Z-H, Zhu Z-X, Shi W-L, Chen X, Cheng L. Droiddet: effective and robust detection of android malware using static analysis along with rotation forest model. Neurocomputing. 2018;272:638\u201346. https:\/\/doi.org\/10.1016\/j.neucom.2017.07.030.","journal-title":"Neurocomputing"},{"key":"2411_CR17","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1016\/j.future.2017.01.019","volume":"78","author":"W Wang","year":"2018","unstructured":"Wang W, Li Y, Wang X, Liu J, Zhang X. Detecting android malicious apps and categorizing benign apps with ensemble of classifiers. Futur Gener Comput Syst. 2018;78:987\u201394. https:\/\/doi.org\/10.1016\/j.future.2017.01.019.","journal-title":"Futur Gener Comput Syst"},{"issue":"2","key":"2411_CR18","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1109\/TCYB.2017.2777960","volume":"49","author":"SY Yerima","year":"2019","unstructured":"Yerima SY, Sezer S. Droidfusion: a novel multilevel classifier fusion approach for android malware detection. IEEE Trans Cybern. 2019;49(2):453\u201366. https:\/\/doi.org\/10.1109\/TCYB.2017.2777960.","journal-title":"IEEE Trans Cybern"},{"issue":"5","key":"2411_CR19","doi-asserted-by":"publisher","first-page":"589","DOI":"10.26599\/TST.2019.9010067","volume":"25","author":"J Tang","year":"2020","unstructured":"Tang J, Li R, Wang K, Gu X, Xu Z. A novel hybrid method to analyze security vulnerabilities in android applications. Tsinghua Sci Technol. 2020;25(5):589\u2013603. https:\/\/doi.org\/10.26599\/TST.2019.9010067.","journal-title":"Tsinghua Sci Technol"},{"issue":"2","key":"2411_CR20","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/3503463","volume":"25","author":"N Daoudi","year":"2022","unstructured":"Daoudi N, Allix K, Bissyand\u00e9 TF, Klein J. A Deep Dive Inside DREBIN: an explorative analysis beyond android malware detection scores. ACM Trans Privacy Secur. 2022;25(2):13\u201311328. https:\/\/doi.org\/10.1145\/3503463. (Accessed 2023-06-23).","journal-title":"ACM Trans Privacy Secur"},{"key":"2411_CR21","doi-asserted-by":"publisher","unstructured":"Kabakus AT. DroidMalwareDetector: a novel android malware detection framework based on convolutional neural network 2022;206:117833. https:\/\/doi.org\/10.1016\/j.eswa.2022.117833","DOI":"10.1016\/j.eswa.2022.117833"},{"issue":"1","key":"2411_CR22","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1109\/TR.2017.2778147","volume":"67","author":"G Tao","year":"2018","unstructured":"Tao G, Zheng Z, Guo Z, Lyu MR. Malpat: mining patterns of malicious and benign android apps via permission-related APIs. IEEE Trans Reliab. 2018;67(1):355\u201369. https:\/\/doi.org\/10.1109\/TR.2017.2778147.","journal-title":"IEEE Trans Reliab"},{"issue":"2","key":"2411_CR23","doi-asserted-by":"publisher","first-page":"1771","DOI":"10.1007\/s13369-022-06949-5","volume":"48","author":"WF Elsersy","year":"2023","unstructured":"Elsersy WF, Anuar NB, Razak MFA. Rootector: robust android rooting detection framework using machine learning algorithms. Arab J Sci Eng. 2023;48(2):1771\u201391. https:\/\/doi.org\/10.1007\/s13369-022-06949-5.","journal-title":"Arab J Sci Eng"},{"key":"2411_CR24","doi-asserted-by":"publisher","first-page":"72509","DOI":"10.1109\/ACCESS.2023.3294263","volume":"11","author":"H Alamro","year":"2023","unstructured":"Alamro H, Mtouaa W, Aljameel S, Salama AS, Hamza MA, Othman AY. Automated android malware detection using optimal ensemble learning approach for cybersecurity. IEEE Access. 2023;11:72509\u201317. https:\/\/doi.org\/10.1109\/ACCESS.2023.3294263.","journal-title":"IEEE Access"},{"key":"2411_CR25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3285289","author":"G Aldehim","year":"2023","unstructured":"Aldehim G, Arasi MA, Khalid M, Aljameel SS, Marzouk R, Mohsen H, Yaseen I, Ibrahim SS. Gauss-mapping black widow optimization with deep extreme learning machine for android malware classification model. IEEE Access. 2023. https:\/\/doi.org\/10.1109\/ACCESS.2023.3285289.","journal-title":"IEEE Access"},{"issue":"15","key":"2411_CR26","doi-asserted-by":"publisher","first-page":"11373","DOI":"10.1007\/s00521-023-08303-8","volume":"35","author":"M Chaudhary","year":"2023","unstructured":"Chaudhary M, Masood A. Realmalsol: real-time optimized model for android malware detection using efficient neural networks and model quantization. Neural Comput Appl. 2023;35(15):11373\u201388. https:\/\/doi.org\/10.1007\/s00521-023-08303-8.","journal-title":"Neural Comput Appl"},{"key":"2411_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15264-6","author":"PK Kaithal","year":"2023","unstructured":"Kaithal PK, Sharma V. A novel efficient optimized machine learning approach to detect malware activities in android applications. Multimed Tools Appl. 2023. https:\/\/doi.org\/10.1007\/s11042-023-15264-6.","journal-title":"Multimed Tools Appl"},{"key":"2411_CR28","doi-asserted-by":"publisher","unstructured":"Chen T, Guestrin C. Xgboost: A scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD \u201916, pp. 785\u2013794. Association for Computing Machinery, New York, NY, USA. 2016. https:\/\/doi.org\/10.1145\/2939672.2939785.","DOI":"10.1145\/2939672.2939785"},{"key":"2411_CR29","doi-asserted-by":"publisher","unstructured":"Syrris V, Geneiatakis D. On machine learning effectiveness for malware detection in android OS using static analysis data. 2021;59: 102794. https:\/\/doi.org\/10.1016\/j.jisa.2021.102794.","DOI":"10.1016\/j.jisa.2021.102794"},{"key":"2411_CR30","unstructured":"Bergstra J, Bardenet R, Bengio Y, K\u00e9gl B. Algorithms for hyper-parameter optimization. In: Advances in Neural Information Processing Systems, vol. 24. Curran Associates, Inc., 2011. https:\/\/papers.nips.cc\/paper_files\/paper\/2011\/hash\/86e8f7ab32cfd12577bc2619bc635690-Abstract.html. Accessed 2023-06-29"},{"issue":"2","key":"2411_CR31","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/s10115-009-0242-y","volume":"21","author":"S-W Lin","year":"2009","unstructured":"Lin S-W, Chen S-C, Wu W-J, Chen C-H. Parameter determination and feature selection for back-propagation network by particle swarm optimization. Knowl Inf Syst. 2009;21(2):249\u201366. https:\/\/doi.org\/10.1007\/s10115-009-0242-y.","journal-title":"Knowl Inf Syst"},{"issue":"6","key":"2411_CR32","doi-asserted-by":"publisher","first-page":"13273","DOI":"10.1007\/s10586-018-1845-4","volume":"22","author":"Y Bi","year":"2019","unstructured":"Bi Y, Xiang M, Sch\u00e4fer F, Lebwohl A, Wang C. A simplified and efficient particle swarm optimization algorithm considering particle diversity. Clust Comput. 2019;22(6):13273\u201382. https:\/\/doi.org\/10.1007\/s10586-018-1845-4.","journal-title":"Clust Comput"},{"key":"2411_CR33","doi-asserted-by":"publisher","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: Characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy, p. 95\u2013109 (2012). https:\/\/doi.org\/10.1109\/SP.2012.16","DOI":"10.1109\/SP.2012.16"},{"issue":"5","key":"2411_CR34","doi-asserted-by":"publisher","first-page":"1774","DOI":"10.1109\/TNNLS.2017.2673241","volume":"29","author":"S Zhang","year":"2018","unstructured":"Zhang S, Li X, Zong M, Zhu X, Wang R. Efficient knn classification with different numbers of nearest neighbors. IEEE Trans Neural Netw Learn Syst. 2018;29(5):1774\u201385. https:\/\/doi.org\/10.1109\/TNNLS.2017.2673241.","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"10","key":"2411_CR35","doi-asserted-by":"publisher","first-page":"1361","DOI":"10.1109\/TKDE.2008.234","volume":"21","author":"L Jiang","year":"2009","unstructured":"Jiang L, Zhang H, Cai Z. A novel bayes model: hidden Naive bayes. IEEE Trans Knowl Data Eng. 2009;21(10):1361\u201371. https:\/\/doi.org\/10.1109\/TKDE.2008.234.","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"3","key":"2411_CR36","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1109\/TSMCB.2005.861067","volume":"36","author":"J-T Jeng","year":"2006","unstructured":"Jeng J-T. Hybrid approach of selecting hyperparameters of support vector machine for regression. IEEE Trans Syst Man Cybern Part B (Cybernetics). 2006;36(3):699\u2013709. https:\/\/doi.org\/10.1109\/TSMCB.2005.861067.","journal-title":"IEEE Trans Syst Man Cybern Part B (Cybernetics)"},{"key":"2411_CR37","doi-asserted-by":"publisher","DOI":"10.1145\/3017427","author":"K Tam","year":"2017","unstructured":"Tam K, Feizollah A, Anuar NB, Salleh R, Cavallaro L. The evolution of android malware and android analysis techniques. ACM Comput Surv. 2017. https:\/\/doi.org\/10.1145\/3017427.","journal-title":"ACM Comput Surv."},{"issue":"3","key":"2411_CR38","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1007\/s10115-017-1111-8","volume":"55","author":"G Ajaeiya","year":"2018","unstructured":"Ajaeiya G, Elhajj IH, Chehab A, Kayssi A, Kneppers M. Mobile apps identification based on network flows. Knowl Inf Syst. 2018;55(3):771\u201396. https:\/\/doi.org\/10.1007\/s10115-017-1111-8.","journal-title":"Knowl Inf Syst"},{"issue":"7","key":"2411_CR39","doi-asserted-by":"publisher","first-page":"1545","DOI":"10.1162\/neco.1997.9.7.1545","volume":"9","author":"Y Amit","year":"1997","unstructured":"Amit Y, Geman D. Shape quantization and recognition with randomized trees. Neural Comput. 1997;9(7):1545\u201388. https:\/\/doi.org\/10.1162\/neco.1997.9.7.1545.","journal-title":"Neural Comput"},{"issue":"1","key":"2411_CR40","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1006\/jcss.1997.1504","volume":"55","author":"Y Freund","year":"1997","unstructured":"Freund Y, Schapire RE. A decision-theoretic generalization of on-line learning and an application to boosting. J Comput Syst Sci. 1997;55(1):119\u201339. https:\/\/doi.org\/10.1006\/jcss.1997.1504.","journal-title":"J Comput Syst Sci"},{"key":"2411_CR41","doi-asserted-by":"publisher","unstructured":"Mirjalili S, Mirjalili SM, Lewis A. Grey wolf optimizer. 2014;69:46\u201361. https:\/\/doi.org\/10.1016\/j.advengsoft.2013.12.007.","DOI":"10.1016\/j.advengsoft.2013.12.007"},{"issue":"3","key":"2411_CR42","doi-asserted-by":"publisher","first-page":"2237","DOI":"10.1007\/s10462-019-09732-5","volume":"53","author":"HA Alsattar","year":"2020","unstructured":"Alsattar HA, Zaidan AA, Zaidan BB. Novel meta-heuristic bald eagle search optimisation algorithm. Artif Intell Rev. 2020;53(3):2237\u201364. https:\/\/doi.org\/10.1007\/s10462-019-09732-5.","journal-title":"Artif Intell Rev"},{"key":"2411_CR43","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-023-05552-1","author":"C Sivanandam","year":"2023","unstructured":"Sivanandam C, Perumal VM, Mohan J. A novel light gbm-optimized long short-term memory for enhancing quality and security in web service recommendation system. J Supercomput. 2023. https:\/\/doi.org\/10.1007\/s11227-023-05552-1.","journal-title":"J Supercomput"},{"issue":"1","key":"2411_CR44","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1186\/s40537-020-00349-y","volume":"7","author":"J Tanha","year":"2020","unstructured":"Tanha J, Abdi Y, Samadi N, Razzaghi N, Asadpour M. Boosting methods for multi-class imbalanced data classification: an experimental review. J Big Data. 2020;7(1):70. https:\/\/doi.org\/10.1186\/s40537-020-00349-y.","journal-title":"J Big Data"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-02411-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-023-02411-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-02411-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,12]],"date-time":"2023-12-12T13:11:08Z","timestamp":1702386668000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-023-02411-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,12]]},"references-count":44,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,1]]}},"alternative-id":["2411"],"URL":"https:\/\/doi.org\/10.1007\/s42979-023-02411-x","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,12]]},"assertion":[{"value":"20 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No conflicts of interest are disclosed by the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"92"}}