{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:39:01Z","timestamp":1776926341355,"version":"3.51.2"},"reference-count":41,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T00:00:00Z","timestamp":1754179200000},"content-version":"vor","delay-in-days":214,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.066198","type":"journal-article","created":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T04:41:04Z","timestamp":1751258464000},"page":"5177-5199","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":3,"title":["Lightweight and Robust Android Ransomware Detection Using Behavioral Analysis and Feature Reduction"],"prefix":"10.32604","volume":"84","author":[{"given":"Muhammad","family":"Sibtain","sequence":"first","affiliation":[]},{"given":"Mehdi","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Qaiser","family":"Riaz","sequence":"additional","affiliation":[]},{"given":"Sana","family":"Qadir","sequence":"additional","affiliation":[]},{"given":"Naveed","family":"Riaz","sequence":"additional","affiliation":[]},{"given":"Ki-Hyun","family":"Jung","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"110138","DOI":"10.1016\/j.comnet.2023.110138","article-title":"Ransomware early detection: a survey","volume":"239","author":"Cen","year":"2024","journal-title":"Comput Netw"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.9734\/ajarr\/2024\/v18i3610","article-title":"The ransomware epidemic: recent cybersecurity incidents demystified","volume":"18","author":"Temara","year":"2024","journal-title":"Asian J Adv Res Rep"},{"key":"ref3","series-title":"Proceedings of the 2017 16th IEEE International Conference on machine learning and applications (ICMLA); 2017 Dec 18\u201321; Cancun, Mexico","article-title":"A bridges, automated behavioral analysis of malware: a case study of WannaCry ransomware","author":"Chen"},{"key":"ref4","author":"Braue","year":"2022","journal-title":"Cybercrime Mag Melb VIC Aust Tech Rep"},{"key":"ref5","unstructured":"Federal Bureau of Investigation (FBI). 2024 Internet Crime Report [Internet]. Washington, DC, USA: Federal Bureau of Investigation; 2024 Mar [cited 2025 May 1]. Available from: https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2024_IC3Report.pdf."},{"key":"ref6","unstructured":"Kaspersky. Banking data theft attacks on smartphones triple in 2024: Kaspersky reports [Internet]. [cited 2025 May 21]. Available from: https:\/\/www.kaspersky.com\/about\/press-releases\/banking-data-theft-attacks-on-smartphones-triple-in-2024-kaspersky-reports."},{"key":"ref7","unstructured":"Kaspersky. Kaspersky predicts quantum-proof ransomware and advancements in mobile financial cyberthreats in 2025 [Internet]. [cited 2025 May 21]. Available from: https:\/\/www.kaspersky.com\/about\/press-releases\/kaspersky-predicts-quantum-proof-ransomware-and-advancements-in-mobile-financial-cyberthreats-in-2025."},{"key":"ref8","doi-asserted-by":"crossref","first-page":"119710","DOI":"10.1109\/ACCESS.2020.3003785","article-title":"A digital DNA sequencing engine for ransomware detection using machine learning","volume":"8","author":"Khan","year":"2020","journal-title":"IEEE Access"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"128754","DOI":"10.1109\/ACCESS.2022.3227579","article-title":"Android ransomware detection from traffic analysis using metaheuristic feature selection","volume":"10","author":"Hossain","year":"2022","journal-title":"IEEE Access"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"87062","DOI":"10.1109\/ACCESS.2023.3285289","article-title":"Gauss-mapping black widow optimization with deep extreme learning machine for android malware classification model","volume":"11","author":"Aldehim","year":"2023","journal-title":"IEEE Access"},{"key":"ref11","first-page":"2339","article-title":"MalVulDroid: tracing vulnerabilities from malware in android using natural language processing","volume":"21","author":"Garg","year":"2022","journal-title":"J Web Eng"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"89031","DOI":"10.1109\/ACCESS.2022.3149053","article-title":"Malware detection: a framework for reverse engineered android applications through machine learning algorithms","volume":"10","author":"Urooj","year":"2022","journal-title":"IEEE Access"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"73127","DOI":"10.1109\/ACCESS.2023.3296606","article-title":"A lightweight and multi-stage approach for Android malware detection using non-invasive machine learning techniques","volume":"11","author":"Da Costa","year":"2023","journal-title":"IEEE Access"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1009","DOI":"10.3390\/e23081009","article-title":"A hybrid analysis-based approach to android malware family classification","volume":"23","author":"Ding","year":"2021","journal-title":"Entropy"},{"key":"ref15","series-title":"Proceedings of the 2019 UK\/China Emerging Technologies (UCET); 2019 Aug 21\u201322; Glasgow, UK","article-title":"An effective Android ransomware detection through multi-factor feature filtration and recurrent neural network","author":"Bibi"},{"key":"ref16","series-title":"Proceedings of the 2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA); 2019 Dec 12\u201314; Los Angeles, CA, USA","article-title":"An intelligent behavior-based ransomware detection system for android platform","author":"Alzahrani"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1016\/j.procs.2021.03.106","article-title":"Android malware detection using deep learning","volume":"184","author":"Elayan","year":"2021","journal-title":"Procedia Comput Sci"},{"key":"ref18","series-title":"Proceedings of the 2020 21st International Arab Conference on Information Technology (ACIT); 2020 Nov 28\u201330; Giza, Egypt","article-title":"Android ransomware detection using machine learning techniques: a comparative analysis on GPU and CPU","author":"Sharma"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"7013","DOI":"10.3390\/s20247013","article-title":"Deep feature extraction and classification of android malware images","volume":"20","author":"Singh","year":"2020","journal-title":"Sensors"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3570603","article-title":"demystifying android malware in the new era","volume":"6","author":"Wang","year":"2022","journal-title":"Proc ACM Meas Anal Comput Syst"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1016\/j.cose.2019.06.004","article-title":"On the effectiveness of system API-related information for Android ransomware detection","volume":"86","author":"Scalas","year":"2019","journal-title":"Comput Secur"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"3706","DOI":"10.3390\/app10113706","article-title":"Optimizing extreme learning machines using chains of salps for efficient Android ransomware detection","volume":"10","author":"Faris","year":"2020","journal-title":"Appl Sci"},{"key":"ref23","author":"Sharma","year":"2020","journal-title":"Proceedings of International Conference on IoT inclusive life (ICIIL 2019)"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"868","DOI":"10.3390\/electronics8080868","article-title":"Ransomware detection system for Android applications","volume":"8","author":"Alsoghyer","year":"2019","journal-title":"Electronics"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"102670","DOI":"10.1016\/j.cose.2022.102670","article-title":"Robust deep learning early alarm prediction model based on the behavioural smell for android malware","volume":"116","author":"Amer","year":"2022","journal-title":"Comput Secur"},{"key":"ref26","first-page":"29","article-title":"Machine learning for android ransomware detection","volume":"19","author":"Bagui","year":"2021","journal-title":"Int J Comput Sci Inf Secur"},{"key":"ref27","first-page":"124579","article-title":"Machine learning approach to detect Android malware using feature-selection based on feature importance score","volume":"8","author":"Pathak","year":"2024","journal-title":"J Eng Res"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/s11416-023-00495-w","article-title":"Android ransomware detection using a novel hamming distance based feature selection","volume":"20","author":"Rahima Manzil","year":"2024","journal-title":"J Comput Virol Hacking Tech"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"10724","DOI":"10.1038\/s41598-024-60982-y","article-title":"PermDroid a framework developed using proposed feature selection approach and machine learning techniques for Android malware detection","volume":"14","author":"Mahindru","year":"2024","journal-title":"Sci Rep"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"22351","DOI":"10.1038\/s41598-024-70544-x","article-title":"Prediction of android ransomware with deep learning model using hybrid cryptography","volume":"14","author":"Kalphana","year":"2024","journal-title":"Sci Rep"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"4404","DOI":"10.1007\/s13198-024-02439-z","article-title":"Behavioral based detection of android ransomware using machine learning techniques","volume":"15","author":"Kirubavathi","year":"2024","journal-title":"Int J Syst Assur Eng Manag"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"103819","DOI":"10.1016\/j.cose.2024.103819","article-title":"It\u2019s too late if exfiltrate: early stage Android ransomware detection","volume":"141","author":"Singh","year":"2024","journal-title":"Comput Secur"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"241","DOI":"10.22214\/ijraset.2024.57885","article-title":"Detection and analysis of android ransomware using the support vector machines","volume":"12","author":"Ngirande","year":"2024","journal-title":"Int J Res Appl Sci Eng Technol"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.30564\/jcsr.v6i2.6632","article-title":"A multi-model fusion strategy for android malware detection based on machine learning algorithms","volume":"6","author":"Xiong","year":"2024","journal-title":"J Comput Sci Res"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"123109","DOI":"10.1016\/j.eswa.2023.123109","article-title":"A malware detection model based on imbalanced heterogeneous graph embeddings","volume":"246","author":"Li","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref36","series-title":"Proceedings of the International Conference on Innovative Computing and Communication 2024; 2024 Feb 16\u201317; New Delhi, India","article-title":"Malware detection insights, mechanisms and future perspectives for android applications","author":"Dahiya"},{"key":"ref37","unstructured":"Kaya Y, Chen Y, Saha S, Pierazzi F, Cavallaro L, Wagner D, et al. Demystifying behavior-based malware detection at endpoints. arXiv:2405.06124. 2024."},{"key":"ref38","first-page":"1","article-title":"AI-enabled approach for enhancing obfuscated malware detection: a hybrid ensemble learning with combined feature selection techniques","volume":"23","author":"Hossain","year":"2024","journal-title":"Int J Syst Assur Eng Manag"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"3689","DOI":"10.3390\/electronics13183689","article-title":"Clop ransomware in action: a comprehensive analysis of its multi-stage tactics","volume":"13","author":"Lee","year":"2024","journal-title":"Electronics"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"123652","DOI":"10.1016\/j.eswa.2024.123652","article-title":"Digital forensic of Maze ransomware: a case of electricity distributor enterprise in ASEAN","volume":"249","author":"Chimmanee","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"6086","DOI":"10.1038\/s41598-024-56706-x","article-title":"Evaluation metrics and statistical tests for machine learning","volume":"14","author":"Rainio","year":"2024","journal-title":"Sci Rep"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-3\/TSP_CMC_66198\/TSP_CMC_66198.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:45:28Z","timestamp":1776923128000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n3\/63184"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":41,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.066198","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-16","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-30","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}