{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T17:12:27Z","timestamp":1773249147004,"version":"3.50.1"},"reference-count":113,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100008386","name":"Marmara University Scientific Research Projects Coordination Unit","doi-asserted-by":"publisher","award":["FDK-2020-10066"],"award-info":[{"award-number":["FDK-2020-10066"]}],"id":[{"id":"10.13039\/501100008386","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3323396","type":"journal-article","created":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T19:29:08Z","timestamp":1696966148000},"page":"123314-123334","source":"Crossref","is-referenced-by-count":10,"title":["Protecting Android Devices From Malware Attacks: A State-of-the-Art Report of Concepts, Modern Learning Models and Challenges"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6813-1037","authenticated-orcid":false,"given":"Esra Calik","family":"Bayazit","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Fatih Sultan Mehmet Vakif University, Beyo&#x011F;lu, Istanbul, Turkey"}]},{"given":"Ozgur Koray","family":"Sahingoz","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Biruni University, Istanbul, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1062-2439","authenticated-orcid":false,"given":"Buket","family":"Dogan","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Faculty of Technology, Marmara University, Istanbul, Turkey"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Statcounter: Desktop vs Mobile vs Tablet Market Share Worldwide 2009 to 2022","year":"2022"},{"key":"ref2","volume-title":"Digital 2022: Global Overview Report","author":"Kemp","year":"2023"},{"key":"ref3","volume-title":"Statcounter: Mobile Operating System Market Share Worldwide From 2012 to 2022","year":"2022"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/iccci54379.2022.9741025"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.01.004"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102449"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3329786"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-015-0261-z"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/hora49412.2020.9152840"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2016.10.012"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3262138"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3296789"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3140341"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/icsccc58608.2023.10176445"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3544968"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2021.2007327"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ccwc54503.2022.9720753"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3301285"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.17559\/tv-20220907113227"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/tsmc.1985.6313354"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381949"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4756-0"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/iconat57137.2023.10080696"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/52.877857"},{"key":"ref26","first-page":"311","article-title":"SPiKE: Engineering malware analysis tools using unobtrusive binary-instrumentation","volume-title":"Proc. 29th Australas. Comput. Sci. Conf. Citeseer","volume":"48","author":"Vasudevan"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-022-07096-6"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ccwc54503.2022.9720869"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3187094"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/iced.2016.7804708"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.4316\/aece.2021.04013"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.04.210"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2012.16"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2021.3094824"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/acct.2013.69"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/issa.2013.6641063"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.02.016"},{"key":"ref38","article-title":"A comprehensive survey on deep learning based malware detection techniques","volume":"47","author":"Gopinath","year":"2023","journal-title":"Comput. Sci. Rev."},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.006"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/gree.2013.24"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3417978"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.05.008"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1080\/01969722.2013.803889"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/cis.2010.77"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-019-0087-1"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/surv.2013.101613.00077"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1852666.1852716"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15512-3_10"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ngmast.2014.57"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/trustcom.2014.49"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ccst.2019.8888430"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2015.7249466"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/eurosp.2017.43"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3183575"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2802130.2802132"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2020.2992253"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.5220\/0010908200003120"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-021-09634-4"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3442520.3442522"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/rdaaps48126.2021.9452002"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ccst.2018.8585560"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_12"},{"key":"ref65","first-page":"468","article-title":"AndroZoo: Collecting millions of Android apps for the research community","volume-title":"Proc. IEEE\/ACM 13th Work. Conf. Mining Softw. Repositories (MSR)","author":"Allix"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/trustcom.2016.0269"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/hora52670.2021.9461302"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1023\/b:naco.0000027755.02868.60"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2958927"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2018.2866319"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.05.026"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1162\/089976600300015015"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/tetci.2019.2910243"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102761"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.08.216"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2013.05.025"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2022.3220219"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-022-00579-6"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.17341\/gazimmfd.937374"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1002\/spe.3112"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3155695"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102670"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/dasa54658.2022.9764984"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/icwr51868.2021.9443025"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3079370"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/prai53619.2021.9551073"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/tnse.2020.2996379"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2020.3025436"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3008081"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/icetci53161.2021.9563414"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/icaase51408.2020.9380104"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/dasc-picom-cbdcom-cyberscitech49142.2020.00052"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/icoiact50329.2020.9332066"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/imcec46724.2019.8983860"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/iccs45141.2019.9065765"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ubi-media.2019.00012"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/ucet.2019.8881884"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/icsess47205.2019.9040821"},{"key":"ref101","article-title":"Android malware detection using autoencoder","author":"Naway","year":"2019","journal-title":"arXiv:1901.07315"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/bigdata47090.2019.9006053"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/icmlc48188.2019.8949298"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/iceccs.2019.00014"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/3199478.3199492"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2951751"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.3233\/jifs-169424"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.01.007"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/2591971.2592003"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/iscc.2017.8024568"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-022-10249-9"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3006143"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/tetci.2023.3281833"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10274970.pdf?arnumber=10274970","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T06:52:43Z","timestamp":1712904763000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10274970\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":113,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3323396","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}