{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T10:48:50Z","timestamp":1775731730081,"version":"3.50.1"},"reference-count":74,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100012639","name":"Prince Sultan University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012639","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3071450","type":"journal-article","created":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T20:03:03Z","timestamp":1617825783000},"page":"57674-57691","source":"Crossref","is-referenced-by-count":74,"title":["Android Ransomware Detection Based on a Hybrid Evolutionary Approach in the Context of Highly Imbalanced Data"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4639-516X","authenticated-orcid":false,"given":"Iman","family":"Almomani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4093-9349","authenticated-orcid":false,"given":"Raneem","family":"Qaddoura","sequence":"additional","affiliation":[]},{"given":"Maria","family":"Habib","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1970-8864","authenticated-orcid":false,"given":"Samah","family":"Alsoghyer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7685-2689","authenticated-orcid":false,"given":"Alaa Al","family":"Khayer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9265-9819","authenticated-orcid":false,"given":"Ibrahim","family":"Aljarah","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4261-8127","authenticated-orcid":false,"given":"Hossam","family":"Faris","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-020-04476-9"},{"key":"ref72","first-page":"1","article-title":"Imbalanced-learn: A python toolbox to tackle the curse of imbalanced datasets in machine learning","volume":"18","author":"lema\u00eetre","year":"2017","journal-title":"J Mach Learn Res"},{"key":"ref71","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref70","first-page":"197","article-title":"ASAF: Android static analysis framework","author":"al khayer","year":"2020","journal-title":"Proc 1st Int Conf Smart Syst Emerg Technol (SMARTTECH)"},{"key":"ref74","author":"yang","year":"2010","journal-title":"Nature-Inspired Metaheuristic Algorithms"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_18"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787905"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.02.002"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CDMA47397.2020.00022"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/j.procs.2020.06.034","article-title":"Android malware detection using LSI-based reduced opcode feature vector","volume":"173","author":"singh","year":"2020","journal-title":"Procedia Comput Sci"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.004"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2018.8500161"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/UCET.2019.8881884"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/app10113706"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1002\/tee.22997"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-019-04336-1"},{"key":"ref61","first-page":"26","article-title":"Loan risk prediction method based on SMOTE and XGBoost","author":"chen","year":"2020","journal-title":"Modern Computer"},{"key":"ref63","author":"zheng","year":"2020","journal-title":"SMOTE variants for imbalanced binary classification Heart disease prediction"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866319"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2982635"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TPS-ISA48467.2019.00013"},{"key":"ref65","first-page":"2361","article-title":"Measuring and modeling the label dynamics of online anti-malware engines","author":"zhu","year":"2020","journal-title":"Proc 29th USENIX Secur Symp (USENIX Secur )"},{"key":"ref66","article-title":"Maat: Automatically analyzing virustotal for accurate labeling and effective malware detection","author":"salem","year":"2020","journal-title":"arXiv 2007 00510"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.09.102"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.07.088"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194020500175"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2958927"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1093\/cybsec\/tyz003","article-title":"Ransomware payments in the bitcoin ecosystem","volume":"5","author":"paquet-clouston","year":"2019","journal-title":"J Cybersecur"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401189"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref22","first-page":"1322","article-title":"ADASYN: Adaptive synthetic sampling approach for imbalanced learning","author":"he","year":"2008","journal-title":"Proc IEEE Int Joint Conf Neural Netw (IEEE World Congr Comput Intell )"},{"key":"ref21","first-page":"878","article-title":"Borderline-SMOTE: A new over-sampling method in imbalanced data sets learning","author":"han","year":"2005","journal-title":"Proc Int Conf Intell Comput"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8080868"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1145\/3338501.3357374","article-title":"Malware detection on highly imbalanced data through sequence modeling","author":"oak","year":"2019","journal-title":"Proc 12th ACM Workshop Artif Intell Secur"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2888568"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LOCS.2019.2918091"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2004.826067"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.1997.637339"},{"key":"ref59","doi-asserted-by":"crossref","DOI":"10.1016\/j.jbi.2020.103465","article-title":"A hybrid sampling algorithm combining M-SMOTE and ENN based on random forest for medical imbalanced data","volume":"107","author":"xu","year":"2020","journal-title":"J Biomed Informat"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1504\/IJKESDP.2011.039875"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2007.19.5.1155"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.10.118"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/s12065-018-0167-z","article-title":"Performance evaluation of support vector machine and convolutional neural network algorithms in real-time vehicle type and color classification","volume":"13","author":"?enta?","year":"2020","journal-title":"Evol Intell"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v10i4.pp3734-3742"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.4236\/jbise.2020.136010"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.3390\/math6120287"},{"key":"ref10","first-page":"121","article-title":"Android ransomware detection based on dynamic obtained features","author":"abdullah","year":"2020","journal-title":"Proc Int Conf Soft Comput Data Mining"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"176","DOI":"10.4018\/978-1-5225-9611-0.ch009","article-title":"A hybrid approach to detect the malicious applications in Android-based smartphones using deep learning","author":"rajkumar","year":"2020","journal-title":"Handbook of Research on Machine and Deep Learning Applications for Cyber Security"},{"key":"ref40","year":"2021","journal-title":"List of Ransomware"},{"key":"ref12","first-page":"311","article-title":"Machine learning classifiers for Android malware detection","volume":"1","author":"agrawal","year":"2020","journal-title":"Data Management Analytics and Innovation"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/s20020461"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1480-7_68"},{"key":"ref15","first-page":"231","article-title":"Intrusion detection method based on support vector machine and information gain for mobile cloud computing","volume":"22","author":"mugabo","year":"2020","journal-title":"IJ Netw Secur"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2938884"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2020.08.010"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MHS.1995.494215"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/130385.130401"},{"key":"ref4","first-page":"33","article-title":"RansomAnalysis: The evolution and investigation of Android ransomware","author":"sharma","year":"2020","journal-title":"Proc Int Conf IoT Inclusive Life (ICIIL)"},{"key":"ref3","article-title":"Should the ransomware be paid?","author":"fang","year":"2020","journal-title":"arXiv 2010 06700"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5539\/mas.v14n3p68"},{"key":"ref5","author":"perlroth","year":"2014","journal-title":"Android Phones Hit by Ransomware"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCISci.2019.8716380"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3006143"},{"key":"ref49","year":"2021","journal-title":"U -C I for Cybersecurity"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3002842"},{"key":"ref46","year":"2021","journal-title":"I&#x2019;m QQ"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_12"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2018.8585560"},{"key":"ref47","author":"project","year":"2021","journal-title":"Kharon malware dataset"},{"key":"ref42","year":"2021","journal-title":"Contagio Malware Dump"},{"key":"ref41","year":"2021","journal-title":"theZoo - A Live Malware Repository"},{"key":"ref44","year":"2021","journal-title":"Analyze Suspicious Files and URLs to Detect Types of Malware Automatically"},{"key":"ref43","year":"2021","journal-title":"Koodous APKs"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09398647.pdf?arnumber=9398647","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T18:50:59Z","timestamp":1643223059000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9398647\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":74,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3071450","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}