{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:44:40Z","timestamp":1772642680463,"version":"3.50.1"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T00:00:00Z","timestamp":1772582400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T00:00:00Z","timestamp":1772582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-026-04865-1","type":"journal-article","created":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T12:21:09Z","timestamp":1772626869000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Critical Review : Malware Detection and Analysis in Android Devices using Machine Learning"],"prefix":"10.1007","volume":"7","author":[{"given":"Taaha","family":"Multani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7671-0099","authenticated-orcid":false,"given":"Viren","family":"Joshi","sequence":"additional","affiliation":[]},{"given":"Jyoti","family":"Wadmare","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,4]]},"reference":[{"key":"4865_CR1","unstructured":"Statista Global Operating Systems Market Share, 15 September. 2023. [Online]. Available: https:\/\/www.statista.com\/statistics\/268237\/global-market-share-held-by-operating-systems-since-2009\/"},{"key":"4865_CR2","unstructured":"Statista Mobile Operating System Statistics, 15 September 2023. [Online]. Available: https:\/\/www.statista.com\/topics\/876\/android\/"},{"key":"4865_CR3","unstructured":"GetAstra. Malware Statistics, 15 September 2023. [Online]. Available: https:\/\/www.getastra.com\/blog\/security-audit\/malware-statistics\/"},{"key":"4865_CR4","doi-asserted-by":"crossref","unstructured":"Lindorfer M, Neumayr M, Caballero J, Platzer C. Cross-platform malware: write once, infect everywhere, in ACM SIGSAC Conference on Computer & Communications Security (CCS), New York, New York, 2013.","DOI":"10.1145\/2508859.2512517"},{"key":"4865_CR5","doi-asserted-by":"crossref","unstructured":"Allix K, Jerome Q, Bissyande TF, Klien J, State R, Traon YL. a forensic analysis of android malware - how is malware written and how it could be detected? in IEEE 38th Annual Computer Software and Applications Conference, Vasteras, Sweden, 2014.","DOI":"10.1109\/COMPSAC.2014.61"},{"key":"4865_CR6","doi-asserted-by":"crossref","unstructured":"Li J, Sun L, Yan Q, Srisa-an W, Ye H. Significant permission identification for Machine-Learning-Based Android malware detection. IEEE Trans Ind Informat, pp. 3216\u201325, 2018.","DOI":"10.1109\/TII.2017.2789219"},{"key":"4865_CR7","doi-asserted-by":"crossref","unstructured":"Sufatrio D, Tan TW, Chua TV. 2015 Securing Android: A Survey Taxonomy and Challenges. ACM Comput Surv 42: 58.","DOI":"10.1145\/2733306"},{"key":"4865_CR8","first-page":"45","volume":"27","author":"SH Qing","year":"2016","unstructured":"Qing SH. Research progress on Android Security. J Softw. 2016;27:45\u201371.","journal-title":"J Softw"},{"key":"4865_CR9","doi-asserted-by":"crossref","unstructured":"Al-Asli M, Ghaleb TA. Review of signature-based techniques in antivirus products, in International Conference on Computer and Information Sciences (ICCIS), Sakaka, Saudi Arabia, 2019.","DOI":"10.1109\/ICCISci.2019.8716381"},{"key":"4865_CR10","doi-asserted-by":"crossref","unstructured":"Chen S, Xue M, Tang Z, Xu L, Zhu H. Stromdroid: A streamlined machine learning-based system for detecting android malware, Asia Conference on Computer and Communications Security, pp. 377\u2013388, 2016.","DOI":"10.1145\/2897845.2897860"},{"key":"4865_CR11","doi-asserted-by":"publisher","DOI":"10.1145\/2963145","author":"M Xu","year":"2016","unstructured":"Xu M, Song C, Ji Y, Shih MW, Lu K, Zheng C, Duan R. 2016 Toward engineering a secure Android ecosystem: a survey of existing techniques. ACM Comput Survery.","journal-title":"ACM Comput Survery"},{"key":"4865_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2386139","author":"P Faruki","year":"2015","unstructured":"Faruki P, Bharmal A, Laxmi V, Ganmoor V, Gaur MS, Conti M, Rajarajan M. 2015 Android security: A survey of issues, malware penetration, and defenses. IEEE Communication Surverys Tutorials.","journal-title":"IEEE Commun Surv Tutor"},{"key":"4865_CR13","unstructured":"Secure an Android Device, 15 September 2023. [Online]. Available: https:\/\/source.android.com\/security"},{"key":"4865_CR14","unstructured":"Platform Architecture. 2023 September 2023. [Online]. Available: https:\/\/developer.android.com\/guide\/platform\/"},{"key":"4865_CR15","first-page":"384","volume-title":"Android Security Internals: An In-depth Guide to Android\u2019s Security Architecture","author":"N Elenkov","year":"2015","unstructured":"Elenkov N. Android Security Internals: An In-depth Guide to Android\u2019s Security Architecture. in Android Security Internals: An In-depth Guide to Android\u2019s Security Architecture. San Francisco, CA, USA: No Starch; 2015. p. 384."},{"key":"4865_CR16","unstructured":"Paper ASW. 15 September 2023. [Online]. Available: https:\/\/storage.googleapis.com\/android-com\/resources\/enterprise\/pdfs\/AE%20Security%20Paper_V6%20CM.pdf\/"},{"key":"4865_CR17","doi-asserted-by":"crossref","unstructured":"Arse M, Sharma K, Bindewari S, Tomar A, Patil H, Jha N. Mitigating Malware Attacks using Machine Learning: A Review, in International Conference on Artificial Intelligence and Smart Communication (AISC), Greater Noida, India, 2023.","DOI":"10.1109\/AISC56616.2023.10085630"},{"key":"4865_CR18","doi-asserted-by":"publisher","first-page":"6249","DOI":"10.1109\/ACCESS.2019.2963724","volume":"8","author":"AO Aslan","year":"2020","unstructured":"Aslan A O., Samet R. A comprehensive review on malware detection approaches. IEEE Access. 2020;8:6249\u201371.","journal-title":"IEEE Access"},{"key":"4865_CR19","unstructured":"Dey A. Machine learning algorithms: A review. Int J Comput Sci Inform Technol, pp. 1174\u20139, 2016."},{"key":"4865_CR20","unstructured":"Learning M. 30 April 2020. [Online]. Available: https:\/\/en.wikipedia.org\/wiki\/Machine_learning"},{"key":"4865_CR21","doi-asserted-by":"crossref","unstructured":"Mohammed M, Khan BM, Bashier EBM. Machine Learning: Algorithms and Applications, in Machine Learning: Algorithms and Applications, Boca Raton, Florida, USA, Taylor & Francis Group, 2016.","DOI":"10.1201\/9781315371658"},{"key":"4865_CR22","unstructured":"Das K, Behera RN. A Survey on Machine Learning: Concept,Algorithms and Applications. Int J Innovative Res Comput Communication Eng, 2017."},{"key":"4865_CR23","doi-asserted-by":"crossref","unstructured":"Memon M, Unar AA, Ahmed SS, Daudpoto GH, Jaffari R. Feature-Based Semi-Supervised Learning Approach to Android Malware Detection, in The 2nd International Conference on Emerging Trends in Electronic and Telecommunication Engineering, Karachi, Pakistan, 2023.","DOI":"10.3390\/engproc2023032006"},{"issue":"1","key":"4865_CR24","doi-asserted-by":"publisher","first-page":"103126","DOI":"10.1016\/j.cose.2023.103126","volume":"128","author":"Y Wu","year":"2023","unstructured":"Wu Y, Li M, Zeng Q, Yang T, Wang J, Fang Z, Cheng L. DroidRL: Feature selection for android malware detection with reinforcement learning. Computers Secur. 2023;128(1):103126.","journal-title":"Comput Secur"},{"key":"4865_CR25","doi-asserted-by":"crossref","unstructured":"McLaughlin N, Martinez J, del Rincon B, Kang S, Yerima P, Miller S, Sezer Y, Safaei E, Trickel Z, Zhao A, Doupe, Ahn GJ. Deep Android Malware Detection, in Seventh ACM Conferene on Data and Application Security and Privacy, New York, New York, USA, 2017.","DOI":"10.1145\/3029806.3029823"},{"key":"4865_CR26","doi-asserted-by":"crossref","unstructured":"Zhou Y, Jiang X. Dissecting Android Malware: Characterization and Evolution, Symposium on Security and Privacy, pp. 95\u2013109, 2012.","DOI":"10.1109\/SP.2012.16"},{"issue":"1","key":"4865_CR27","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/s11416-014-0226-7","volume":"11","author":"VM de Afonso","year":"2015","unstructured":"Afonso VM, de Amorium MF, Gr\u00e9gio ARA, Junquera GB, de Geus PL. Identifying android malware using dynamically obtained features. J Comput Virol Hacking Techniques. 2015;11(1):9\u201317.","journal-title":"J Comput Virol Hacking Tech"},{"key":"4865_CR28","unstructured":"Alzaylaee MK, Yerima SY, Sezer S. Dynalog: an automated dynamic analysis framework for characterizing android applications, in International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, UK, 2016."},{"key":"4865_CR29","doi-asserted-by":"crossref","unstructured":"Arp D, Spreitzenbarth M, Huebner M, Gascon H, Rieck K. Drebin: Efficient and Explainable Detection of Android Malware in Your Pocket, in 21th Annual Network and Distributed System Security Symposium (NDSS), 2014.","DOI":"10.14722\/ndss.2014.23247"},{"key":"4865_CR30","doi-asserted-by":"crossref","unstructured":"Spreitzenbarth M, Echtler F, Schreck T, Freling FC, Hoffmann J. MobileSandbox: Looking Deeper into Android Applications, in 28th International ACM Symposium on Applied Computing (SAC), 2013.","DOI":"10.1145\/2480362.2480701"},{"issue":"3","key":"4865_CR31","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s11416-018-0316-z","volume":"14","author":"P Irolla","year":"2018","unstructured":"Irolla P, Dey A. The duplication issue within the Drebin dataset. J Comput Virol Hacking Techniques. 2018;14(3):245\u20139.","journal-title":"J Comput Virol Hacking Techniques"},{"key":"4865_CR32","doi-asserted-by":"crossref","unstructured":"Mishra J, Sahay S, Rathore H, Kumar L. Duplicates in the Drebin Dataset and Reduction in the Accuracy of the Malware Detection Models, in IEEE Asia-Pacific Conference on Communications (APCC), Kuala Lumpur, Malaysia, 2021.","DOI":"10.1109\/APCC49754.2021.9609892"},{"key":"4865_CR33","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.diin.2015.06.002","volume":"14","author":"J-w Jang","year":"2015","unstructured":"Jang J-w, Kang H, Woo J, Mohaisen A, Kim HK. Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information. Digit Invest. 2015;14:17\u201335.","journal-title":"Digit Invest"},{"key":"4865_CR34","doi-asserted-by":"crossref","unstructured":"Lee J, Jang H, Ha S, Yoon Y. Android malware detection using machine learning with feature selection based on the genetic algorithm. special issue swarm evolutionary computation\u2014bridging Theory Pract, 2021.","DOI":"10.3390\/math9212813"},{"key":"4865_CR35","doi-asserted-by":"crossref","unstructured":"Lashkari AH, Kadir AFA, Taheri L, Ghorbani AA. Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification, in 2018 International Carnahan Conference on Security Technology (ICCST), Montreal, QC, Canada, 2018.","DOI":"10.1109\/CCST.2018.8585560"},{"key":"4865_CR36","doi-asserted-by":"crossref","unstructured":"Mahdavifar S, Abdul Kadir AF, Fatemi R, Alhadidi D, Ghorbani AA. Dynamic Android malware category classification using semi-supervised deep learning, in 2020 IEEE Intl conf on dependable, autonomic and secure computing, intl conf on pervasive intelligence and computing, intl conf on cloud and big data computing, intl conf on cyber science and technology congress (DASC\/PiCom\/CBDCom\/CyberSciTech), Calgary, AB, Canada, 2020.","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00094"},{"key":"4865_CR37","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/s10922-021-09634-4","volume":"30","author":"GAA Mahdavifar","year":"2021","unstructured":"Mahdavifar GAA. Effective and Efficient Hybrid Android Malware Classification Using Pseudo-Label Stacked Auto-Encoder. J Netw Syst Manage. 2021;30:22.","journal-title":"J Netw Syst Manage"},{"key":"4865_CR38","doi-asserted-by":"crossref","unstructured":"Keyes DS, Li B, Kaur G, Lashkari AH, Gagnon F, Massicotte F. EntropLyzer: Android Malware Classification and Characterization Using Entropy Analysis of Dynamic Characteristics, in 2021 Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge (RDAAPS), Hamilton, ON, Canada, 2021.","DOI":"10.1109\/RDAAPS48126.2021.9452002"},{"key":"4865_CR39","doi-asserted-by":"crossref","unstructured":"Rahali A, Lashkari AH, Kaur G, Taheri L, Gagnon F. DIDroid: Android Malware Classification and Characterization Using Deep Image Learning, in ICCNS \u201820: Proceedings of the 2020 10th International Conference on Communication and Network Security, Tokyo, Japan, 2020.","DOI":"10.1145\/3442520.3442522"},{"issue":"3","key":"4865_CR40","first-page":"1","volume":"8","author":"S Seraj","year":"2023","unstructured":"Seraj S, Pavlidis M, Trovati M, Polatidis N. MadDroid: malicious adware detection in Android using deep learning. J Cyber Secur Technol. 2023;8(3):1\u201328.","journal-title":"J Cyber Secur Technol"},{"key":"4865_CR41","doi-asserted-by":"publisher","first-page":"73481","DOI":"10.1109\/ACCESS.2024.3400211","volume":"12","author":"I Almomani","year":"2024","unstructured":"Almomani I, Almashat T, El-Shafai W. Maloid-DS: Labeled Dataset for Android. IEEE Access. 2024;12:73481\u2013546.","journal-title":"IEEE Access"},{"key":"4865_CR42","unstructured":"VirusTotal. [Online]. Available: https:\/\/www.virustotal.com. [Accessed 2024]."},{"issue":"1","key":"4865_CR43","first-page":"102696","volume":"58","author":"A Mathur","year":"2021","unstructured":"Mathur A, Podila L, Kulkarni K, Niyaz Q, Javaid AY. NATICUSdroid: A malware detection framework for Android using native and custom permissions. J Inf Secur Appl. 2021;58(1):102696.","journal-title":"J Inf Secur Appl"},{"key":"4865_CR44","doi-asserted-by":"crossref","unstructured":"Xie N, Qin Z, Di X. GA-StackingMD: Android Malware Detection Method Based on Genetic Algorithm Optimized Stacking. Appl Sci, 2023.","DOI":"10.3390\/app13042629"},{"key":"4865_CR45","doi-asserted-by":"publisher","first-page":"89031","DOI":"10.1109\/ACCESS.2022.3149053","volume":"10","author":"B Urooj","year":"2022","unstructured":"Urooj B, Shah MA, Maple C, Abbasi MK, Riasat S. Malware Detection: A Framework for Reverse Engineered Android Applications Through Machine Learning Algorithms. IEEE Access. 2022;10:89031\u201350.","journal-title":"IEEE Access"},{"issue":"2","key":"4865_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3503463","volume":"25","author":"N Daoudi","year":"2022","unstructured":"Daoudi N, Allix K, Bissyand\u00e9 TF, Klein J. A Deep Dive Inside DREBIN: An Explorative Analysis beyond Android Malware Detection Scores. ACM Trans Priv Secur. 2022;25(2):1\u201328.","journal-title":"ACM Trans Priv Secur"},{"key":"4865_CR47","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s10664-014-9352-6","volume":"21","author":"K Allix","year":"2016","unstructured":"Allix K, Bissyand\u00e9 TF, J\u00e9rome Q, Klein J, State R, Le Traon Y. Empirical assessment of machine learning-based malware detectors for Android. Empir Softw Eng. 2016;21:183\u2013211.","journal-title":"Empir Softw Eng"},{"key":"4865_CR48","doi-asserted-by":"crossref","unstructured":"Singh MP, Khan HK. Malware Detection in Android Applications Using Machine Learning, 2023 International Conference on Advances in Electronics, Communication, Computing and Intelligent Information Systems (ICAECIS), pp. 105\u2013110, 2023.","DOI":"10.1109\/ICAECIS58353.2023.10170311"},{"key":"4865_CR49","doi-asserted-by":"crossref","unstructured":"Raghuvanshi P, Singh JP. Android Malware Detection Using Machine Learning Techniques, 2022 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 1117\u20131121, 2022.","DOI":"10.1109\/CSCI58124.2022.00200"},{"key":"4865_CR50","doi-asserted-by":"crossref","unstructured":"Sahs J, Khan L. A Machine Learning Approach to Android Malware Detection, in European Intelligence and Security Informatics Conference, Odense, Denmark, 2012.","DOI":"10.1109\/EISIC.2012.34"},{"key":"4865_CR51","doi-asserted-by":"publisher","first-page":"156285","DOI":"10.1109\/ACCESS.2024.3485593","volume":"12","author":"CC Obidiagha","year":"2024","unstructured":"Obidiagha CC, Rahouti M, Hayajneh T. DeepImageDroid: A Hybrid Framework Leveraging Visual Transformers and Convolutional Neural Networks for Robust Android Malware Detection. IEEE Access. 2024;12:156285\u2013306.","journal-title":"IEEE Access"},{"key":"4865_CR52","doi-asserted-by":"crossref","unstructured":"Bhatia T, Kaushal R. Malware detection in android based on dynamic analysis, in International Conference on Cyber Security And Protection Of Digital Services (Cyber Security), London, UK, 2017.","DOI":"10.1109\/CyberSecPODS.2017.8074847"},{"key":"4865_CR53","unstructured":"Monkey, Tool. 15 9 2023. [Online]. Available: https:\/\/developer.android.com\/studio\/test\/other-testing-tools\/monkey"},{"key":"4865_CR54","doi-asserted-by":"publisher","first-page":"536","DOI":"10.18517\/ijaseit.10.2.10238","volume":"10","author":"R Thangaveloo","year":"2020","unstructured":"Thangaveloo R, Jing Ww, Leng CK, Abdullah J. DATDroid: dynamic analysis technique in android malware detection. Int J Adv Sci Eng Inf Technol. 2020;10:536\u201341.","journal-title":"Int J Adv Sci Eng Inf Technol"},{"key":"4865_CR55","unstructured":"DroidBox. 15 9 2023. [Online]. Available: https:\/\/github.com\/pjlantz\/droidbox"},{"key":"4865_CR56","unstructured":"Alzaylaee MK, Yerima SY, Sezer S. Dynalog: an automated dynamic analysis framework for characterizing android applications, in 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), IEEE, 2016."},{"key":"4865_CR57","doi-asserted-by":"crossref","unstructured":"Wang X, Zhang L, Zhao K, Ding X, Yu M. MFDroid: A stacking ensemble learning framework for android malware Detection. Sensors, p. 2597, 2022.","DOI":"10.3390\/s22072597"},{"key":"4865_CR58","unstructured":"FlowDroid. 15 9 2023. [Online]. Available: https:\/\/github.com\/secure-software-engineering\/FlowDroid"},{"key":"4865_CR59","unstructured":"AndroGuard. 15 9 2023. [Online]. Available: https:\/\/androguard.readthedocs.io\/en\/latest\/index.html"},{"key":"4865_CR60","doi-asserted-by":"crossref","unstructured":"Mahindru A and., Sangal AL. FSDroid : A feature selection technique to detect malware from Android using Machine Learning Techniques. Springer pp. 13271\u2013323, 2021.","DOI":"10.1007\/s11042-020-10367-w"},{"key":"4865_CR61","doi-asserted-by":"crossref","unstructured":"Yerima SY, Sezer S. DroidFusion: A Novel multilevel classifier fusion approach for android malware detection. IEEE Trans Cybernetics, pp. 453\u201366, 2019.","DOI":"10.1109\/TCYB.2017.2777960"},{"key":"4865_CR62","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1911.10113","author":"MK Alzaylaee","year":"2020","unstructured":"Alzaylaee MK, Yerima SY, Sezer S. DL-Droid: Deep learning based android malware detection using real devices. Computers Secur. 2020. doi: 10.48550\/arXiv.1911.10113 https:\/\/doi.org\/10.48550\/arXiv.1911.10113","journal-title":"Computers Secur"},{"key":"4865_CR63","doi-asserted-by":"crossref","unstructured":"Feng R, Chen S, Xie X, Meng G, Lin S-W, Lie Y. A Performance-sensitive malware detection system using deep learning on mobile devices, IEEE Transactions on Information Forensics and Security, vol. 16, pp. 1635\u2009\u2013\u20091578, 2020.","DOI":"10.1109\/TIFS.2020.3025436"},{"key":"4865_CR64","doi-asserted-by":"publisher","first-page":"4182","DOI":"10.1007\/s11227-021-04020-y","volume":"78","author":"S Li","year":"2022","unstructured":"Li S, Zhou Q, Zhou R, Lv Q. Intelligent malware detection based on graph convolutional network. J Supercomputing. 2022;78:4182\u201398.","journal-title":"J Supercomputing"},{"key":"4865_CR65","doi-asserted-by":"crossref","unstructured":"Keyvanpour MR, Shirzad MB, Heydarian F. Android malware detection applying feature selection techniques and machine learning. Springer pp. 9517\u201331, 2023.","DOI":"10.1007\/s11042-022-13767-2"},{"key":"4865_CR66","doi-asserted-by":"publisher","first-page":"5183","DOI":"10.1007\/s00521-020-05309-4","volume":"33","author":"A Mahindru","year":"2021","unstructured":"Mahindru A, Sangal AL. MLDroid\u2014framework for Android malware detection using machine learning techniques. Neural Comput Appl. 2021;33:5183\u2013240.","journal-title":"Neural Comput Appl"},{"key":"4865_CR67","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1109\/TCYB.2017.2777960","volume":"49","author":"SY Yerima","year":"2018","unstructured":"Yerima SY, Sezer S, DroidFusion:. A Novel Multilevel Classifier Fusion Approach for Android Malware Detection. IEEE Trans Cybernetics. 2018;49:453\u201366.","journal-title":"IEEE Trans Cybernetics"},{"key":"4865_CR68","doi-asserted-by":"publisher","first-page":"S48","DOI":"10.1016\/j.diin.2018.01.007","volume":"24","author":"EB Karbab","year":"2018","unstructured":"Karbab EB, Debbabi M, Derhab A, Mouheb D. MalDozer: Automatic framework for android malware detection using deep learning. Digit Invest. 2018;24:S48\u201359.","journal-title":"Digit Invest"},{"key":"4865_CR69","doi-asserted-by":"crossref","unstructured":"Baye G, Hussain F, Oracevic A, Hussain R, Ahsan Kazmi S. API Security in Large Enterprises: Leveraging Machine Learning for Anomaly Detection, in 2021 International Symposium on Networks, Computers and Communications (ISNCC), Dubai, United Arab Emirates, 2021.","DOI":"10.1109\/ISNCC52172.2021.9615638"},{"key":"4865_CR70","doi-asserted-by":"crossref","unstructured":"Alamro H, Mtouaa W, Aljameel S, Salama AS, Hamza MA, Othman AY. pp. 72509\u201372517, Automated Android Malware Detection Using Optimal Ensemble Learning Approach for Cybersecurity. IEEE Access (Volume 11), 2023.","DOI":"10.1109\/ACCESS.2023.3294263"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-026-04865-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-026-04865-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-026-04865-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T12:21:17Z","timestamp":1772626877000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-026-04865-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,4]]},"references-count":70,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2026,3]]}},"alternative-id":["4865"],"URL":"https:\/\/doi.org\/10.1007\/s42979-026-04865-1","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,4]]},"assertion":[{"value":"7 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interests"}}],"article-number":"249"}}