{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T05:32:40Z","timestamp":1740115960732,"version":"3.37.3"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,10]]},"DOI":"10.1109\/acit62805.2024.10876988","type":"proceedings-article","created":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T18:27:16Z","timestamp":1739816836000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Unveiling Android Malware: A Deep Learning Perspective Using RNN and LSTM"],"prefix":"10.1109","author":[{"given":"Abdullah","family":"Alqammaz","sequence":"first","affiliation":[{"name":"Zarqa University,Cyber Security Department,AzZarqa,Jordan"}]},{"given":"Mohammad Rasmi","family":"Al-Mousa","sequence":"additional","affiliation":[{"name":"Zarqa University,Cyber Security Department,AzZarqa,Jordan"}]},{"given":"Ali Abu","family":"Zaid","sequence":"additional","affiliation":[{"name":"Zarqa University,Cyber Security Department,AzZarqa,Jordan"}]},{"given":"Mahmoud","family":"Asassfeh","sequence":"additional","affiliation":[{"name":"Zarqa University,Cyber Security Department,AzZarqa,Jordan"}]},{"given":"Mohammad Abdulrazzaq","family":"Rajab","sequence":"additional","affiliation":[{"name":"University of Anbar,Computer Science Department,Anbar,Iraq"}]},{"given":"Sherien","family":"Dajah","sequence":"additional","affiliation":[{"name":"The World Islamic Sciences &#x0026; Education University,Management Department,Amman,Jordan"}]},{"given":"Abdulla M F","family":"Alali","sequence":"additional","affiliation":[{"name":"Zarqa University,Computer Scince Department,AzZarqa,Jordan"}]},{"given":"Mohammed","family":"Khouj","sequence":"additional","affiliation":[{"name":"University of Business and Technology,Electrical Engineering Department,Jeddah,Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2012.34"},{"issue":"2","key":"ref2","first-page":"34","article-title":"De-LADY: Deep learning based Android malware detection using Dynamic features","volume":"11","author":"Sihag","year":"2021","journal-title":"J. Internet Serv. Inf. Secur"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.34028\/iajit\/19\/4\/9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101663"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.34028\/iajit\/17\/4A\/4"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE55969.2022.00026"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.107069"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT58888.2023.10453827"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/EICEEAI56378.2022.10050464"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/info12050185"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-70866-5_4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/QRS54544.2021.00015"},{"key":"ref13","first-page":"607","article-title":"Development of a Secure Model for Mobile Government Applications in Jordan","volume":"16","author":"Awwad","year":"2024","journal-title":"Int. Arab J. Inf. Technol"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2013.53"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v16i01.26433"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.10.466"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/app12094140"}],"event":{"name":"2024 25th International Arab Conference on Information Technology (ACIT)","start":{"date-parts":[[2024,12,10]]},"location":"Zarqa, Jordan","end":{"date-parts":[[2024,12,12]]}},"container-title":["2024 25th International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10876862\/10876868\/10876988.pdf?arnumber=10876988","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T19:58:01Z","timestamp":1740081481000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10876988\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/acit62805.2024.10876988","relation":{},"subject":[],"published":{"date-parts":[[2024,12,10]]}}}