{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T09:06:08Z","timestamp":1771319168273,"version":"3.50.1"},"reference-count":91,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T00:00:00Z","timestamp":1767657600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["ICT Express"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1016\/j.icte.2026.01.005","type":"journal-article","created":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T17:12:48Z","timestamp":1767719568000},"page":"186-208","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"title":["Feature-driven static analysis for learning-based android malware detection: A review"],"prefix":"10.1016","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-9446-4891","authenticated-orcid":false,"given":"Sumesh","family":"Kharnotia","sequence":"first","affiliation":[]},{"given":"Bhavna","family":"Arora","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0734-0959","authenticated-orcid":false,"given":"Ravdeep","family":"Kour","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.icte.2026.01.005_bib0001","unstructured":"Mobile Operating System Market Share Worldwide | Statcounter Global Stats, (n.d.). https:\/\/gs.statcounter.com\/os-market-share\/mobile\/worldwide (accessed October 7, 2025)."},{"key":"10.1016\/j.icte.2026.01.005_bib0003","doi-asserted-by":"crossref","DOI":"10.1063\/5.0247642","article-title":"A nano-design of a quantum-based arithmetic and logic unit for enhancing the efficiency of the future IoT applications","volume":"15","author":"Ahmadpour","year":"2025","journal-title":"AIP. Adv."},{"key":"10.1016\/j.icte.2026.01.005_bib0004","unstructured":"McAfee 2023 Consumer Mobile Threat Report | McAfee Blog, (n.d.). https:\/\/www.mcafee.com\/blogs\/internet-security\/mcafee-2023-consumer-mobile-threat-report\/(accessed February 23, 2025)."},{"key":"10.1016\/j.icte.2026.01.005_bib0005","unstructured":"Sophos 2023 threat report maturing criminal marketplaces present new challenges to defenders Sophos X-Ops, n.d. https:\/\/www.sophos.com\/en-us\/content\/security-threat-report (accessed July 8, 2024)."},{"key":"10.1016\/j.icte.2026.01.005_bib0006","unstructured":"AV-ATLAS - Malware & PUA, (n.d.). https:\/\/portal.av-atlas.org\/malware\/statistics (accessed October 7, 2025)."},{"key":"10.1016\/j.icte.2026.01.005_bib0007","doi-asserted-by":"crossref","unstructured":"S. Kharnotia, B. Arora, Android malware detection using learning techniques: a review, lecture notes in Networks and Systems 1128 LNNS (2025) 271\u2013283. https:\/\/doi.org\/10.1007\/978-981-97-7371-8_21.","DOI":"10.1007\/978-981-97-7371-8_21"},{"key":"10.1016\/j.icte.2026.01.005_bib0008","unstructured":"Attacks on mobile devices significantly increase in 2023 | Kaspersky, (n.d.). https:\/\/www.kaspersky.com\/about\/press-releases\/2024_attacks-on-mobile-devices-significantly-increase-in-2023 (accessed August 29, 2024)."},{"key":"10.1016\/j.icte.2026.01.005_bib0009","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1016\/j.icte.2020.04.005","article-title":"A survey of IoT malware and detection methods based on static features","volume":"6","author":"Ngo","year":"2020","journal-title":"ICT Express"},{"key":"10.1016\/j.icte.2026.01.005_bib0010","doi-asserted-by":"crossref","first-page":"3753","DOI":"10.1007\/s10586-022-03776-z","article-title":"Internet of Things intrusion detection systems: a comprehensive review and future directions","volume":"26","author":"Heidari","year":"2023","journal-title":"Cluster. Comput."},{"key":"10.1016\/j.icte.2026.01.005_bib0011","doi-asserted-by":"crossref","first-page":"632","DOI":"10.1016\/j.icte.2024.03.005","article-title":"A study of the relationship of malware detection mechanisms using Artificial Intelligence","volume":"10","author":"Song","year":"2024","journal-title":"ICT Express"},{"key":"10.1016\/j.icte.2026.01.005_bib0012","doi-asserted-by":"crossref","first-page":"1007","DOI":"10.1007\/s00521-021-06597-0","article-title":"Applications of deep learning for mobile malware detection: a systematic literature review","volume":"34","author":"Catal","year":"2022","journal-title":"Neural Comput. Appl."},{"key":"10.1016\/j.icte.2026.01.005_bib0013","article-title":"Android malware analysis and detection: a systematic review","author":"Dahiya","year":"2023","journal-title":"Expert. Syst."},{"key":"10.1016\/j.icte.2026.01.005_bib0014","doi-asserted-by":"crossref","first-page":"1330","DOI":"10.1109\/TETCI.2023.3281833","article-title":"Android malware detection methods based on convolutional neural network: a survey","volume":"7","author":"Shu","year":"2023","journal-title":"IEEe Trans. Emerg. Top. Comput. Intell."},{"key":"10.1016\/j.icte.2026.01.005_bib0015","doi-asserted-by":"crossref","first-page":"123314","DOI":"10.1109\/ACCESS.2023.3323396","article-title":"Protecting android devices from malware attacks: a State-of-the-art report of concepts, modern learning models and challenges","volume":"11","author":"Bayazit","year":"2023","journal-title":"IEEE Access."},{"key":"10.1016\/j.icte.2026.01.005_bib0016","article-title":"Android malware detection and identification frameworks by leveraging the machine and deep learning techniques: a comprehensive review","volume":"14","author":"Smmarwar","year":"2024","journal-title":"Telematics Informatics Rep."},{"key":"10.1016\/j.icte.2026.01.005_bib0017","doi-asserted-by":"crossref","first-page":"1877","DOI":"10.1007\/s10207-024-00822-2","article-title":"A comprehensive review on permissions-based Android malware detection","volume":"23","author":"Sharma","year":"2024","journal-title":"Int. J. Inf. Secur."},{"key":"10.1016\/j.icte.2026.01.005_bib0018","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10207-025-01027-x","article-title":"Comprehensive review on machine learning and deep learning techniques for malware detection in android and IoT devices","volume":"24","author":"Almobaideen","year":"2025","journal-title":"Int. J. Inf. Secur."},{"key":"10.1016\/j.icte.2026.01.005_bib0019","article-title":"The PRISMA 2020 statement: an updated guideline for reporting systematic reviews","volume":"372","author":"Page","year":"2021","journal-title":"BMJ"},{"key":"10.1016\/j.icte.2026.01.005_bib0020","unstructured":"Android Open Source Project, (n.d.). https:\/\/source.android.com\/(accessed April 13, 2025)."},{"key":"10.1016\/j.icte.2026.01.005_bib0021","unstructured":"Platform architecture | Android Developers, (n.d.). https:\/\/developer.android.com\/guide\/platform (accessed April 15, 2025)."},{"key":"10.1016\/j.icte.2026.01.005_bib0022","unstructured":"Application fundamentals | Android Developers, (n.d.). https:\/\/developer.android.com\/guide\/components\/fundamentals (accessed May 20, 2025)."},{"key":"10.1016\/j.icte.2026.01.005_bib0023","article-title":"Botnets unveiled: a comprehensive survey on evolving threats and defense strategies","volume":"35","author":"Asadi","year":"2024","journal-title":"Trans. Emerging Telecommun. Technol."},{"key":"10.1016\/j.icte.2026.01.005_bib0024","doi-asserted-by":"crossref","DOI":"10.1145\/3708500","article-title":"Characterization of Android Malwares and their families","volume":"57","author":"Sharma","year":"2025","journal-title":"ACM. Comput. Surv."},{"key":"10.1016\/j.icte.2026.01.005_bib0025","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1016\/j.icte.2020.11.001","article-title":"Ransomware detection using random forest technique","volume":"6","author":"Khammas","year":"2020","journal-title":"ICT Express"},{"key":"10.1016\/j.icte.2026.01.005_bib0026","doi-asserted-by":"crossref","first-page":"32351","DOI":"10.1007\/s11042-024-20455-w","article-title":"PacDroid: lightweight android malware detection using permissions and intent features","volume":"84","author":"Kadir","year":"2024","journal-title":"Multimed. Tools. Appl."},{"key":"10.1016\/j.icte.2026.01.005_bib0027","doi-asserted-by":"crossref","DOI":"10.1007\/s00521-021-06755-4","article-title":"HamDroid: permission-based harmful android anti-malware detection using neural networks","author":"Seraj","year":"2022","journal-title":"Neural Comput. Appl."},{"key":"10.1016\/j.icte.2026.01.005_bib0028","doi-asserted-by":"crossref","first-page":"14246","DOI":"10.1109\/ACCESS.2022.3146363","article-title":"LinRegDroid: detection of Android malware using multiple linear regression models-based classifiers","volume":"10","author":"Sahin","year":"2022","journal-title":"IEEE Access."},{"key":"10.1016\/j.icte.2026.01.005_bib0029","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1016\/j.icte.2021.09.003","article-title":"A bayesian probability model for Android malware detection","volume":"8","author":"Mat","year":"2022","journal-title":"ICT Express"},{"key":"10.1016\/j.icte.2026.01.005_bib0030","doi-asserted-by":"crossref","first-page":"4903","DOI":"10.1007\/s00521-021-05875-1","article-title":"A novel permission-based Android malware detection system using feature selection based on linear regression","volume":"35","author":"\u015eahin","year":"2023","journal-title":"Neural Comput. Appl."},{"key":"10.1016\/j.icte.2026.01.005_bib0031","first-page":"1","article-title":"Static analysis framework for permission-based dataset generation and android malware detection using machine learning","volume":"2024","author":"Pathak","year":"2024","journal-title":"EURASIP. J. Inf. Secur."},{"key":"10.1016\/j.icte.2026.01.005_bib0032","doi-asserted-by":"crossref","first-page":"5255","DOI":"10.1007\/s00521-024-10950-4","article-title":"Permissions-based Android malware detection using machine learning","volume":"37","author":"Alomar","year":"2025","journal-title":"Neural Comput. Appl."},{"key":"10.1016\/j.icte.2026.01.005_bib0033","first-page":"13","article-title":"An ensemble approach based on fuzzy logic using machine learning classifiers for Android malware detection","author":"Atacak","year":"2023","journal-title":"Appl. Sci. (Switzerland)"},{"key":"10.1016\/j.icte.2026.01.005_bib0034","doi-asserted-by":"crossref","first-page":"1243","DOI":"10.1007\/s12652-021-03376-6","article-title":"A novel Android malware detection system: adaption of filter-based feature selection methods","volume":"14","author":"\u015eahin","year":"2023","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"10.1016\/j.icte.2026.01.005_bib0035","series-title":"IPAnalyzer: A novel Android malware Detection System Using Ranked Intents and Permissions","author":"Sharma","year":"2024"},{"key":"10.1016\/j.icte.2026.01.005_bib0036","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/s11416-023-00495-w","article-title":"Android ransomware detection using a novel hamming distance based feature selection","volume":"20","author":"Rahima Manzil","year":"2024","journal-title":"J. Computer Virology Hacking Tech."},{"key":"10.1016\/j.icte.2026.01.005_bib0037","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1007\/s10207-022-00579-6","article-title":"MAPAS: a practical deep learning-based android malware detection system","volume":"21","author":"Kim","year":"2022","journal-title":"Int. J. Inf. Secur."},{"key":"10.1016\/j.icte.2026.01.005_bib0038","doi-asserted-by":"crossref","first-page":"1115","DOI":"10.1007\/s10207-023-00679-x","article-title":"SFCGDroid: android malware detection based on sensitive function call graph","volume":"22","author":"Shi","year":"2023","journal-title":"Int. J. Inf. Secur."},{"key":"10.1016\/j.icte.2026.01.005_bib0039","doi-asserted-by":"crossref","DOI":"10.1016\/j.phycom.2022.101975","article-title":"Droid-MCFG: android malware detection system using manifest and control flow traces with multi-head temporal convolutional network","volume":"57","author":"Ullah","year":"2023","journal-title":"Phys. Commun."},{"key":"10.1016\/j.icte.2026.01.005_bib0040","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.121617","article-title":"Android malware detection method based on graph attention networks and deep fusion of multimodal features","volume":"237","author":"Chen","year":"2024","journal-title":"Expert. Syst. Appl."},{"key":"10.1016\/j.icte.2026.01.005_bib0041","first-page":"140","article-title":"GSEDroid: gNN-based Android malware detection framework using lightweight semantic embedding","author":"Gu","year":"2024","journal-title":"Comput. Secur."},{"key":"10.1016\/j.icte.2026.01.005_bib0042","doi-asserted-by":"crossref","unstructured":"G. Ye, J. Zhang, H. Li, Z. Tang, T. Lv, Android malware detection technology based on lightweight convolutional neural networks, security and communication networks 2022 (2022). https:\/\/doi.org\/10.1155\/2022\/8893764.","DOI":"10.1155\/2022\/8893764"},{"key":"10.1016\/j.icte.2026.01.005_bib0043","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.119593","article-title":"An effective end-to-end android malware detection method","volume":"218","author":"Zhu","year":"2023","journal-title":"Expert. Syst. Appl."},{"key":"10.1016\/j.icte.2026.01.005_bib0044","doi-asserted-by":"crossref","first-page":"2700","DOI":"10.1109\/ACCESS.2022.3140341","article-title":"An automated vision-based deep learning model for efficient detection of Android malware attacks","volume":"10","author":"Almomani","year":"2022","journal-title":"IEEE Access."},{"key":"10.1016\/j.icte.2026.01.005_bib0045","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2022.102622","article-title":"EfficientNet convolutional neural networks-based Android malware detection","volume":"115","author":"Yadav","year":"2022","journal-title":"Comput. Secur."},{"key":"10.1016\/j.icte.2026.01.005_bib0046","doi-asserted-by":"crossref","first-page":"24891","DOI":"10.1007\/s11042-022-14236-6","article-title":"EfficientNet deep learning meta-classifier approach for image-based android malware detection","volume":"82","author":"Ravi","year":"2023","journal-title":"Multimed. Tools. Appl."},{"key":"10.1016\/j.icte.2026.01.005_bib0047","doi-asserted-by":"crossref","first-page":"2756","DOI":"10.1109\/JSYST.2023.3238678","article-title":"Obfuscated malware detection in IoT Android applications using Markov Images and CNN","volume":"17","author":"Dhanya","year":"2023","journal-title":"IEEE Syst. J."},{"key":"10.1016\/j.icte.2026.01.005_bib0048","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2025.113855","article-title":"A novel image based approach for mobile android malware detection and classification","volume":"323","author":"Yapici","year":"2025","journal-title":"Knowl. Based. Syst."},{"key":"10.1016\/j.icte.2026.01.005_bib0049","doi-asserted-by":"crossref","first-page":"25696","DOI":"10.1109\/ACCESS.2022.3155695","article-title":"A malware detection approach using autoencoder in deep learning","volume":"10","author":"Xing","year":"2022","journal-title":"IEEE Access."},{"key":"10.1016\/j.icte.2026.01.005_bib0050","doi-asserted-by":"crossref","DOI":"10.1186\/s13677-022-00349-8","article-title":"A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization","volume":"11","author":"Ullah","year":"2022","journal-title":"J. Cloud Comput."},{"key":"10.1016\/j.icte.2026.01.005_bib0051","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1109\/TCYB.2022.3164625","article-title":"Cyber code intelligence for Android malware detection","volume":"53","author":"Qiu","year":"2023","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.icte.2026.01.005_bib0052","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2022.3149053","article-title":"Malware detection: a framework for reverse engineered Android applications through machine learning algorithms","author":"Urooj","year":"2022","journal-title":"IEEE Access."},{"key":"10.1016\/j.icte.2026.01.005_bib0053","doi-asserted-by":"crossref","first-page":"5558","DOI":"10.1109\/TKDE.2021.3067658","article-title":"A hybrid deep network framework for Android malware detection","volume":"34","author":"Zhu","year":"2022","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.icte.2026.01.005_bib0054","doi-asserted-by":"crossref","first-page":"15471","DOI":"10.1109\/ACCESS.2023.3244656","article-title":"A novel machine learning approach for Android malware detection based on the Co-existence of features","volume":"11","author":"Odat","year":"2023","journal-title":"IEEE Access."},{"key":"10.1016\/j.icte.2026.01.005_bib0055","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1007\/s11235-022-00983-2","article-title":"Android malware detection based on sensitive patterns","volume":"82","author":"Liu","year":"2023","journal-title":"Telecommun. Syst."},{"key":"10.1016\/j.icte.2026.01.005_bib0056","first-page":"13","article-title":"A context-aware Android malware detection approach using machine learning","author":"AlJarrah","year":"2022","journal-title":"Information (Switzerland)"},{"key":"10.1016\/j.icte.2026.01.005_bib0057","doi-asserted-by":"crossref","first-page":"9464","DOI":"10.1016\/j.jksuci.2021.11.004","article-title":"A multi-tiered feature selection model for android malware detection based on feature discrimination and information gain","volume":"34","author":"Bhat","year":"2022","journal-title":"J. King Saud Univer. - Comput. Inf. Sci."},{"key":"10.1016\/j.icte.2026.01.005_bib0058","article-title":"MFDroid: a stacking ensemble learning framework for Android malware detection","volume":"22","author":"Wang","year":"2022","journal-title":"Sensors"},{"key":"10.1016\/j.icte.2026.01.005_bib0059","first-page":"14","article-title":"Permissions-based detection of Android malware using machine learning","author":"Akbar","year":"2022","journal-title":"Symmetry. (Basel)"},{"key":"10.1016\/j.icte.2026.01.005_bib0060","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/s12065-020-00518-1","article-title":"SOMDROID: android malware detection by artificial neural network trained using unsupervised learning","volume":"15","author":"Mahindru","year":"2022","journal-title":"Evol. Intell."},{"key":"10.1016\/j.icte.2026.01.005_bib0061","doi-asserted-by":"crossref","first-page":"73214","DOI":"10.1109\/ACCESS.2022.3189645","article-title":"PAIRED: an explainable lightweight android malware detection system","volume":"10","author":"Alani","year":"2022","journal-title":"IEEE Access."},{"key":"10.1016\/j.icte.2026.01.005_bib0062","doi-asserted-by":"crossref","first-page":"9517","DOI":"10.1007\/s11042-022-13767-2","article-title":"Android malware detection applying feature selection techniques and machine learning","volume":"82","author":"Keyvanpour","year":"2023","journal-title":"Multimed. Tools. Appl."},{"key":"10.1016\/j.icte.2026.01.005_bib0063","first-page":"13","article-title":"GA-StackingMD: android malware detection method based on genetic algorithm optimized stacking","author":"Xie","year":"2023","journal-title":"Appl. Sci. (Switzerland)"},{"key":"10.1016\/j.icte.2026.01.005_bib0064","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.117833","article-title":"DroidMalwareDetector: a novel Android malware detection framework based on convolutional neural network","volume":"206","author":"Kabakus","year":"2022","journal-title":"Expert. Syst. Appl."},{"key":"10.1016\/j.icte.2026.01.005_bib0065","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2022.102915","article-title":"An Android malware detection and classification approach based on contrastive lerning","volume":"123","author":"Yang","year":"2022","journal-title":"Comput. Secur."},{"key":"10.1016\/j.icte.2026.01.005_bib0066","article-title":"Android malware detection based on multi-head squeeze-and-excitation residual network","volume":"212","author":"juan Zhu","year":"2023","journal-title":"Expert. Syst. Appl."},{"key":"10.1016\/j.icte.2026.01.005_bib0067","article-title":"LTAChecker: lightweight Android malware detection based on Dalvik opcode sequences using attention temporal networks","author":"Liu","year":"2024","journal-title":"IEEe Internet. Things. J."},{"key":"10.1016\/j.icte.2026.01.005_bib0068","doi-asserted-by":"crossref","DOI":"10.3390\/informatics10030067","article-title":"A proposed artificial intelligence model for Android-malware detection","volume":"10","author":"Taher","year":"2023","journal-title":"Informatics"},{"key":"10.1016\/j.icte.2026.01.005_bib0069","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2025.104379","article-title":"MOSDroid: obfuscation-resilient android malware detection using multisets of encoded opcode sequences","volume":"152","author":"Sharma","year":"2025","journal-title":"Comput. Secur."},{"key":"10.1016\/j.icte.2026.01.005_bib0070","doi-asserted-by":"crossref","first-page":"1169","DOI":"10.23919\/cje.2021.00.451","article-title":"EAODroid: android malware detection based on enhanced API order","volume":"32","author":"Huang","year":"2023","journal-title":"Chinese J. Electr."},{"key":"10.1016\/j.icte.2026.01.005_bib0071","doi-asserted-by":"crossref","first-page":"117334","DOI":"10.1109\/ACCESS.2022.3219047","article-title":"A method for automatic android malware detection based on static analysis and deep learning","volume":"10","author":"Ibrahim","year":"2022","journal-title":"IEEe Access."},{"key":"10.1016\/j.icte.2026.01.005_bib0072","unstructured":"Apktool | Apktool, (n.d.). https:\/\/apktool.org\/(accessed March 1, 2025)."},{"key":"10.1016\/j.icte.2026.01.005_bib0073","unstructured":"GitHub - androguard\/androguard: reverse engineering and pentesting for Android applications, (n.d.). https:\/\/github.com\/androguard\/androguard (accessed October 7, 2025)."},{"key":"10.1016\/j.icte.2026.01.005_bib0074","unstructured":"AAPT2 | Android Studio | Android Developers, (n.d.). https:\/\/developer.android.com\/tools\/aapt2 (accessed March 17, 2025)."},{"key":"10.1016\/j.icte.2026.01.005_bib0075","unstructured":"GitHub - skylot\/jadx: Dex to Java decompiler, (n.d.). https:\/\/github.com\/skylot\/jadx (accessed March 26, 2025)."},{"key":"10.1016\/j.icte.2026.01.005_bib0076","unstructured":"GitHub - pxb1988\/dex2jar: tools to work with android .Dex and java .Class files, (n.d.). https:\/\/github.com\/pxb1988\/dex2jar (accessed April 4, 2025)."},{"key":"10.1016\/j.icte.2026.01.005_bib0077","unstructured":"GitHub - charles2gan\/GDA-android-reversing-Tool, (n.d.). https:\/\/github.com\/charles2gan\/GDA-android-reversing-Tool (accessed April 19, 2025)."},{"key":"10.1016\/j.icte.2026.01.005_bib0078","unstructured":"GitHub - alexMyG\/AndroPyTool: a framework for automated extraction of static and dynamic features from Android applications, (n.d.). https:\/\/github.com\/alexMyG\/AndroPyTool (accessed April 25, 2025)."},{"key":"10.1016\/j.icte.2026.01.005_bib0079","unstructured":"GitHub - JesusFreke\/smali: smali\/baksmali, (n.d.). https:\/\/github.com\/JesusFreke\/smali (accessed April 30, 2025)."},{"key":"10.1016\/j.icte.2026.01.005_bib0080","doi-asserted-by":"crossref","first-page":"124996","DOI":"10.1109\/ACCESS.2023.3323845","article-title":"Android malware detection by correlated real permission couples using FP growth algorithm and neural networks","volume":"11","author":"Banik","year":"2023","journal-title":"IEEe Access."},{"key":"10.1016\/j.icte.2026.01.005_bib0081","doi-asserted-by":"crossref","unstructured":"Y. Wu, M. Li, J. Wang, Z. Fang, Q. Zeng, T. Yang, L. Cheng, DroidRL: reinforcement learning driven feature selection for Android malware detection, (2022). https:\/\/doi.org\/10.1016\/j.cose.2023.103126.","DOI":"10.2139\/ssrn.4067267"},{"key":"10.1016\/j.icte.2026.01.005_bib0082","doi-asserted-by":"crossref","first-page":"10525","DOI":"10.1007\/s11042-023-16035-z","article-title":"A new approach to android malware detection using fuzzy logic-based simulated annealing and feature selection","volume":"83","author":"Seyfari","year":"2024","journal-title":"Multimed. Tools. Appl."},{"key":"10.1016\/j.icte.2026.01.005_bib0083","doi-asserted-by":"crossref","first-page":"8560","DOI":"10.1109\/JIOT.2022.3194881","article-title":"An enhanced deep learning neural network for the detection and identification of Android malware","volume":"10","author":"Musikawan","year":"2023","journal-title":"IEEE Internet. Things. J."},{"key":"10.1016\/j.icte.2026.01.005_bib0084","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1007\/s11219-022-09602-4","article-title":"Predicting Android malware combining permissions and API call sequences","volume":"31","author":"Chen","year":"2023","journal-title":"Softw. Quality J."},{"key":"10.1016\/j.icte.2026.01.005_bib0085","doi-asserted-by":"crossref","first-page":"7744","DOI":"10.1109\/TII.2024.3363016","article-title":"Android malware detection method based on CNN and DNN bybrid mechanism","volume":"20","author":"Dong","year":"2024","journal-title":"IEEe Trans. Industr. Inform."},{"key":"10.1016\/j.icte.2026.01.005_bib0086","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/s12083-021-01244-w","article-title":"MINAD: multi-inputs neural network based on application structure for Android malware detection","volume":"15","author":"Nguyen","year":"2022","journal-title":"Peer. Peer. Netw. Appl."},{"key":"10.1016\/j.icte.2026.01.005_bib0087","doi-asserted-by":"crossref","first-page":"163","DOI":"10.23919\/JSEE.2024.000018","article-title":"DCEL: classifier fusion model for Android malware detection","volume":"35","author":"Xu","year":"2024","journal-title":"J. Syst. Eng. Electr."},{"issue":"15","key":"10.1016\/j.icte.2026.01.005_bib0088","doi-asserted-by":"crossref","first-page":"11373","DOI":"10.1007\/s00521-023-08303-8","article-title":"RealMalSol: real-time optimized model for Android malware detection using efficient neural networks and model quantization","volume":"35","author":"Chaudhary","year":"2023","journal-title":"Neural Comput. Applications"},{"issue":"3","key":"10.1016\/j.icte.2026.01.005_bib0089","doi-asserted-by":"crossref","DOI":"10.1007\/s11554-023-01311-w","article-title":"RT-Droid: a novel approach for real-time android application analysis with transfer learning-based CNN models","volume":"20","author":"Tasyurek","year":"2023","journal-title":"J. Real. Time Image Process."},{"key":"10.1016\/j.icte.2026.01.005_bib0090","first-page":"60","article-title":"Lightweight machine learning-based static analysis framework for real-time android malware detection","volume":"3","author":"Sekhar","year":"2025","journal-title":"Synthesis: A Multidisciplinary Res. J."},{"issue":"4","key":"10.1016\/j.icte.2026.01.005_bib0091","doi-asserted-by":"crossref","first-page":"3255","DOI":"10.1007\/s11276-025-03932-4","article-title":"Securing and optimizing IoT offloading with blockchain and deep reinforcement learning in multi-user environments","volume":"31","author":"Heidari","year":"2025","journal-title":"Wireless Netw."},{"issue":"7","key":"10.1016\/j.icte.2026.01.005_bib0092","doi-asserted-by":"crossref","first-page":"6139","DOI":"10.1007\/s10115-025-02410-9","article-title":"A new flow-based approach for enhancing botnet detection efficiency using convolutional neural networks and long short-term memory","volume":"67","author":"Asadi","year":"2025","journal-title":"Knowl. Inf. Syst."}],"container-title":["ICT Express"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2405959526000056?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2405959526000056?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T08:10:31Z","timestamp":1771315831000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2405959526000056"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":91,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["S2405959526000056"],"URL":"https:\/\/doi.org\/10.1016\/j.icte.2026.01.005","relation":{},"ISSN":["2405-9595"],"issn-type":[{"value":"2405-9595","type":"print"}],"subject":[],"published":{"date-parts":[[2026,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Feature-driven static analysis for learning-based android malware detection: A review","name":"articletitle","label":"Article Title"},{"value":"ICT Express","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.icte.2026.01.005","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Authors. Published by Elsevier B.V. on behalf of The Korean Institute of Communications and Information Sciences.","name":"copyright","label":"Copyright"}]}}