{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:12:42Z","timestamp":1774627962502,"version":"3.50.1"},"reference-count":99,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T00:00:00Z","timestamp":1638230400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100009614","name":"Petroleum Technology Development Fund","doi-asserted-by":"publisher","award":["PTDF\/ED\/PHD\/AMA\/1245\/17\/17"],"award-info":[{"award-number":["PTDF\/ED\/PHD\/AMA\/1245\/17\/17"]}],"id":[{"id":"10.13039\/501100009614","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100009614","name":"Petroleum Technology Development Fund","doi-asserted-by":"publisher","award":["PTDF\/ED\/PHD\/AMA\/1245\/17\/17"],"award-info":[{"award-number":["PTDF\/ED\/PHD\/AMA\/1245\/17\/17"]}],"id":[{"id":"10.13039\/501100009614","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"abstract":"<jats:p>The evolution of mobile technology has increased correspondingly with the number of attacks on mobile devices. Malware attack on mobile devices is one of the top security challenges the mobile community faces daily. While malware classification and detection tools are being developed to fight malware infection, hackers keep deploying different infection strategies, including permissions usage. Among mobile platforms, Android is the most targeted by malware because of its open OS and popularity. Permissions is one of the major security techniques used by Android and other mobile platforms to control device resources and enhance access control. In this study, we used the t-Distribution stochastic neighbor embedding (t-SNE) and Self-Organizing Map techniques to produce a visualization method using exploratory factor plane analysis to visualize permissions correlation in Android applications. Two categories of datasets were used for this study: the benign and malicious datasets. Dataset was obtained from Contagio, VirusShare, VirusTotal, and Androzoo repositories. A total of 12,267 malicious and 10,837 benign applications with different categories were used. We demonstrate that our method can identify the correlation between permissions and classify Android applications based on their protection and threat level. Our results show that every permission has a threat level. This signifies those permissions with the same protection level have the same threat level.<\/jats:p>","DOI":"10.3390\/jcp1040035","type":"journal-article","created":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T20:29:27Z","timestamp":1638304167000},"page":"704-742","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Modeling Correlation between Android Permissions Based on Threat and Protection Level Using Exploratory Factor Plane Analysis"],"prefix":"10.3390","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1016-0791","authenticated-orcid":false,"given":"Moses","family":"Ashawa","sequence":"first","affiliation":[{"name":"Digital Investigation Unit\/Centre for Electronic Warfare, Information, and Cyber\/Defence and Security, Defence Academy of the UK, Cranfield University, Shrivenham SN6 8LA, UK"}]},{"given":"Sarah","family":"Morris","sequence":"additional","affiliation":[{"name":"Digital Investigation Unit\/Centre for Electronic Warfare, Information, and Cyber\/Defence and Security, Defence Academy of the UK, Cranfield University, Shrivenham SN6 8LA, UK"}]}],"member":"1968","published-online":{"date-parts":[[2021,11,30]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"216671","DOI":"10.1109\/ACCESS.2020.3041432","article-title":"A Comprehensive Analysis of the Android Permissions System","volume":"8","author":"Almomani","year":"2020","journal-title":"IEEE Access"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Peng, S., Cao, L., Zhou, Y., Xie, J., Yin, P., and Mo, J. (2020\u20131, January 31). Challenges and Trends of Android Malware Detection in the Era of Deep Learning. Proceedings of the 2020 IEEE 8th International Conference on Smart City and Informatization (iSCI), Guangzhou, China.","DOI":"10.1109\/iSCI50694.2020.00014"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"102098","DOI":"10.1016\/j.adhoc.2020.102098","article-title":"End-to-end malware detection for android IoT devices using deep learning","volume":"101","author":"Ren","year":"2020","journal-title":"Ad Hoc Netw."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Hussain, S.J., Ahmed, U., Liaquat, H., Mir, S., Jhanjhi, N., and Humayun, M. (2019, January 3\u20134). IMIAD: Intelligent Malware Identification for Android Platform. Proceedings of the 2019 International Conference on Computer and Information Sciences (ICCIS), Sakaka, Saudi Arabia.","DOI":"10.1109\/ICCISci.2019.8716471"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Faruki, P. (2013, January 26\u201328). AndroSimilar: Robust Statistical Feature Signature for Android Malware Detection. Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, Turkey.","DOI":"10.1145\/2523514.2523539"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"125786","DOI":"10.1109\/ACCESS.2020.3008081","article-title":"A Two-Layer Deep Learning Method for Android Malware Detection Using Network Traffic","volume":"8","author":"Feng","year":"2020","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1148","DOI":"10.1360\/SSI-2019-0149","article-title":"Android malware detection: A survey","volume":"50","author":"Yu","year":"2020","journal-title":"Sci. Sin. Inf."},{"key":"ref_8","first-page":"871","article-title":"Host-Based Detection and Analysis of Android Malware","volume":"9","author":"Ashawa","year":"2019","journal-title":"Int. J. Inf. Secur. Res."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"177","DOI":"10.17781\/P002605","article-title":"Analysis of Android Malware Detection Techniques: A Systematic Review","volume":"8","author":"Ashawa","year":"2019","journal-title":"Int. J. Cyber-Secur. Digit. Forensics"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Chin, E., Hanna, S., Song, D., and Wagner, D. (2011, January 17\u201321). Android permissions demystified. Proceedings of the 18th ACM conference on Computer and communications security, Chicago, IL, USA.","DOI":"10.1145\/2046707.2046779"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., and Wagner, D. (2012, January 11\u201313). Android permissions: A perspective combining risks and benefits. Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS \u201812). Association for Computing Machinery, New York, NY, USA.","DOI":"10.1145\/2335356.2335360"},{"key":"ref_12","first-page":"17","article-title":"Mobile Applications and Access to Private Data: The Supply Side of the Android Ecosystem","volume":"17","author":"Kesler","year":"2018","journal-title":"SSRN Electron. J."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"101573","DOI":"10.1016\/j.cose.2019.101573","article-title":"Android Fragmentation in Malware Detection","volume":"87","author":"Ahn","year":"2019","journal-title":"Comput. Secur."},{"key":"ref_14","unstructured":"Ifip, A., Conference, W.G., and Hutchison, D. (2013). Data and Applications Security and Privacy XXVII, Springer."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Wei, X., Gomez, L., Neamtiu, I., and Faloutsos, M. (2012, January 3\u20137). Permission evolution in the Android ecosystem. Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC \u201812), Association for Computing Machinery, New York, NY, USA.","DOI":"10.1145\/2420950.2420956"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Gorski, S.A., and Enck, W. (2019, January 15\u201317). ARF: Identifying redelegation vulnerabilities in Android system services. Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks (WiSec \u201819). Association for Computing Machinery, New York, NY, USA.","DOI":"10.1145\/3317549.3319725"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Monrose, F., Dacier, M., Blanc, G., and Garcia-Alfaro, J. (2016, January 19\u201321). Research in Attacks, Intrusions, and Defenses. Proceedings of the 19th International Symposium, RAID 2016, Paris, France.","DOI":"10.1007\/978-3-319-45719-2"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Zhauniarovich, Y., and Gadyatskaya, O. (2016). Small Changes, Big Changes: An Updated View on the Android Permission System, Sringer.","DOI":"10.1007\/978-3-319-45719-2_16"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Mahmood, R., Mirzaei, N., and Malek, S. (2014). EvoDroid: Segmented Evolutionary Testing of Android apps, Springer.","DOI":"10.1145\/2635868.2635896"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Gallingani, D., Zanero, S., and Venkatakrishnan, V.N. (2015, January 2\u20134). Practical exploit generation for intent message vulnerabilities in android. Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (CODASPY \u201915). Association for Computing Machinery, New York, NY, USA.","DOI":"10.1145\/2699026.2699132"},{"key":"ref_21","unstructured":"Elish, K.O., Yao, D.D., Ryder, B.G., and Tech, V. (2021, July 09). On the need of precise inter-app ICC classification for detecting Android malware collusions. In Proceedings of IEEE Mobile Security Technologies (MoST), in Conjunction with the IEEE Symposium on Security and Privacy. Available online: https:\/\/www.ieee-security.org\/TC\/SPW2015\/MoST\/papers\/s2p4.pdf."},{"key":"ref_22","first-page":"1027","article-title":"Deep learning for effective Android malware detection using API call graph embeddings","volume":"24","author":"Acarman","year":"2019","journal-title":"Soft Comput."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"106576","DOI":"10.1016\/j.infsof.2021.106576","article-title":"BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection","volume":"136","author":"Cao","year":"2021","journal-title":"Inf. Softw. Technol."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Wu, Y., Lu, J., and Zhang, Y. (2021, January 27\u201330). Vulnerability Detection in C\/C ++ Source Code with Graph Representation Learning. Proceedings of the 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC), Nevada, NV, USA.","DOI":"10.1109\/CCWC51732.2021.9376145"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Alasmary, H., Abusnaina, A., Jang, R., Abuhamad, M., Anwar, A., Nyang, D., and Mohaisen, D. (December, January 29). Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers. Proceedings of the 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS), Singapore.","DOI":"10.1109\/ICDCS47774.2020.00089"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"57829","DOI":"10.1109\/ACCESS.2019.2912210","article-title":"AC-Net: Assessing the Consistency of Description and Permission in Android Apps","volume":"7","author":"Feng","year":"2019","journal-title":"IEEE Access"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1109\/TIFS.2017.2767019","article-title":"Android User Privacy Preserving Through Crowdsourcing","volume":"13","author":"Rashidi","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"15823","DOI":"10.1109\/ACCESS.2020.2965954","article-title":"CrowdNet: Identifying Large-Scale Malicious Attacks Over Android Kernel Structures","volume":"8","author":"Wang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1504\/IJESDF.2018.090948","article-title":"Effective methods to detect metamorphic malware: A systematic review","volume":"10","author":"Irshad","year":"2018","journal-title":"Int. J. Electron. Secur. Digit. Forensics"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"6754","DOI":"10.1109\/TII.2020.3048791","article-title":"VMShield: Memory Introspection-Based Malware Detection to Secure Cloud-Based Services Against Stealthy Attacks","volume":"17","author":"Mishra","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Joux, A. (2021, July 09). Attacks on stream ciphers. Taylor and Francis Group, algorithmic cryptanalysis. Available online: https:\/\/www.iacr.org\/books\/2010_tf_Joux_AlgorithmicCryptanalysis.pdf.","DOI":"10.1201\/9781420070033"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Yuan, Y., Wu, L., Zhang, X., and Yang, Y. (2017, January 27\u201329). Side-channel collision attack based on multiple-bits. Proceedings of the 2017 11th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID), Xiamen, China.","DOI":"10.1109\/ICASID.2017.8285732"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Song, L., Tang, Z., Li, Z., Gong, X., Chen, X., Fang, D., and Wang, Z. (2017, January 15\u201317). AppIS: Protect Android Apps Against Runtime Repackaging Attacks. Proceedings of the 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS), Shenzhen, China.","DOI":"10.1109\/ICPADS.2017.00015"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Arnaldy, D., and Perdana, A.R. (2019, January 10\u201311). Implementation and Analysis of Penetration Techniques Using the Man-In-The-Middle Attack. Proceedings of the 2019 2nd International Conference of Computer and Informatics Engineering (IC2IE), Banyuwangi, Indonesia.","DOI":"10.1109\/IC2IE47452.2019.8940872"},{"key":"ref_35","first-page":"228","article-title":"Permission-Based Android Malware Detection","volume":"2","author":"Aung","year":"2013","journal-title":"Int. J. Sci. Technol. Res."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Sahin, D., Kural, O.E., Akleylek, S., and K\u0131l\u0131\u00e7, E. (2021). A novel permission-based Android malware detection system using feature selection based on linear regression. Neural Comput. Appl., 1\u201316.","DOI":"10.1007\/s00521-021-05875-1"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Mcdonald, J., Herron, N., Glisson, W., and Benton, R. (2021, January 5\u20138). Machine Learning-Based Android Malware Detection Using Manifest Permissions. Proceedings of the 54th Hawaii International Conference on System Sciences, Kauai, HI, USA.","DOI":"10.24251\/HICSS.2021.839"},{"key":"ref_38","first-page":"102696","article-title":"NATICUSdroid: A malware detection framework for Android using native and custom permissions","volume":"58","author":"Mathur","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_39","first-page":"1","article-title":"Android malware detection using permission analysis","volume":"2017","author":"Shahriar","year":"2017","journal-title":"SoutheastCon"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Al Ajrawi, S., Agrawal, A., Mangal, H., Putluri, K., Reid, B., Hanna, G., and Sarkar, M. (2021). Evaluating business Yelp\u2019s star ratings using sentiment analysis. Mater. Today Proc.","DOI":"10.1016\/j.matpr.2020.12.137"},{"key":"ref_41","first-page":"1","article-title":"Latent Semantic Indexing: An overview","volume":"240","author":"Paper","year":"2000","journal-title":"Techn. Rep. INFOSYS"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"3216","DOI":"10.1109\/TII.2017.2789219","article-title":"Significant Permission Identification for Machine-Learning-Based Android Malware Detection","volume":"14","author":"Li","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"1968","DOI":"10.1109\/TIFS.2019.2950134","article-title":"PermPair: Android Malware Detection Using Permission Pairs","volume":"15","author":"Arora","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Khariwal, K., Singh, J., and Arora, A. (2020, January 27\u201328). IPDroid: Android Malware Detection using Intents and Permissions. Proceedings of the 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), London, UK.","DOI":"10.1109\/WorldS450073.2020.9210414"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"101977","DOI":"10.1016\/j.artmed.2020.101977","article-title":"Prediction of breast cancer distant recurrence using natural language processing and knowledge-guided convolutional neural network","volume":"110","author":"Wang","year":"2020","journal-title":"Artif. Intell. Med."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"4125","DOI":"10.1007\/s00330-020-06721-z","article-title":"Identification of patients with carotid stenosis using natural language processing","volume":"30","author":"Wu","year":"2020","journal-title":"Eur. Radiol."},{"key":"ref_47","first-page":"455","article-title":"Natural Language Processing based Anomalous System Call Sequences Detection with Virtual Memory Introspection","volume":"11","author":"Peddoju","year":"2020","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_48","unstructured":"2Xipeng, Q.I.U., Tianxiang, S.U.N., Yige, X.U., Yunfan, S., Ning, D.A.I., and Xuanjing, H. (2020). Pre-trained models for natural language processing: A survey. Sci. China Technol. Sci., 63, 1\u201326."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"39680","DOI":"10.1109\/ACCESS.2021.3063748","article-title":"AdMat: A CNN-on-Matrix Approach to Android Malware Detection and Classification","volume":"9","author":"Vu","year":"2021","journal-title":"IEEE Access"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Mahindru, A., and Singh, P. (2017, January 5\u20137). Dynamic Permissions based Android Malware Detection using Machine Learning Techniques. Proceedings of the 10th Innovations in Software Engineering Conference, Jaipur, India.","DOI":"10.1145\/3021460.3021485"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Leeds, M., Keffeler, M., and Atkison, T. (2017, January 13\u201315). A comparison of features for android malware detection. Proceedings of the SouthEast Conference, New York, NY, USA.","DOI":"10.1145\/3077286.3077288"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"2582","DOI":"10.1109\/TIP.2011.2121080","article-title":"A Bayesian Network Model for Automatic and Interactive Image Segmentation","volume":"20","author":"Zhang","year":"2011","journal-title":"IEEE Trans. Image Process."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Sullivan, J., Blake, A., Isard, M., and MacCormick, J. (1999, January 20\u201327). Object localization by Bayesian correlation. Proceedings of the Seventh IEEE International Conference on Computer Vision, Kerkyra, Greece.","DOI":"10.1109\/ICCV.1999.790391"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"13555","DOI":"10.1109\/ACCESS.2018.2797418","article-title":"Cross-Correlation of Large-Scale Parameters in Multi-Link Systems: Analysis Using the Box-Cox Transformation","volume":"6","author":"Dahman","year":"2018","journal-title":"IEEE Access"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1109\/TNB.2010.2043444","article-title":"Estimating Sparse Gene Regulatory Networks Using a Bayesian Linear Regression","volume":"9","author":"Sarder","year":"2010","journal-title":"IEEE Trans. NanoBioscience"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"8737","DOI":"10.1007\/s00500-020-04906-8","article-title":"A latent variable model for two-dimensional canonical correlation analysis and the variational inference","volume":"24","author":"Safayani","year":"2020","journal-title":"Soft Comput."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ACCESS.2020.3033026","article-title":"FAMD: A fast multifeature Android malware detection framework, design and implementation","volume":"8","author":"Bai","year":"2020","journal-title":"IEEE Access"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1111\/coin.12422","article-title":"Classifying and clustering malicious advertisement uniform resource locators using deep learning","volume":"37","author":"Zhang","year":"2020","journal-title":"Comput. Intell."},{"key":"ref_59","first-page":"363","article-title":"Elliptic Curve Diffie-Hellman Key Exchange Algorithm for Securing Hypertext Information on Wide Area Network","volume":"4","author":"Ahirwal","year":"2013","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Barrera, D., Kayacik, H.G., van Oorschot, P.C., and Somayaji, A. (2010, January 4\u20138). A methodology for empirical analysis of permission-based security models and its application to android. Proceedings of the 17th ACM conference on Computer and communications security, Chicago, IL, USA.","DOI":"10.1145\/1866307.1866317"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"1141","DOI":"10.1109\/TVCG.2017.2653106","article-title":"Line Graph or Scatter Plot? Automatic Selection of Methods for Visualizing Trends in Time Series","volume":"24","author":"Wang","year":"2017","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"2305","DOI":"10.1109\/TVCG.2012.249","article-title":"On the Interpolation of Data with Normally Distributed Uncertainty for Visualization","volume":"18","author":"Schlegel","year":"2012","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00371-020-01921-6","article-title":"Deep color transfer using histogram analogy","volume":"36","author":"Lee","year":"2020","journal-title":"Vis. Comput."},{"key":"ref_64","first-page":"3221","article-title":"Accelerating t-SNE using Tree-Based Algorithms","volume":"15","year":"2014","journal-title":"J. Mach. Learn. Res."},{"key":"ref_65","unstructured":"Arora, S. (2018, January 5\u20139). An Analysis of the t-SNE Algorithm for Data Visualization. Proceedings of the Conference on Learning Theory, Stockholm, Sweden."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"8545","DOI":"10.1007\/s00521-019-04353-z","article-title":"Application of self-organizing map and fuzzy c-mean techniques for rockburst clustering in deep underground projects","volume":"32","author":"Faradonbeh","year":"2019","journal-title":"Neural Comput. Appl."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"1442","DOI":"10.1016\/j.cageo.2006.01.007","article-title":"An icosahedron-based method for even binning of globally distributed remote sensing data","volume":"32","author":"Teanby","year":"2006","journal-title":"Comput. Geosci."},{"key":"ref_68","unstructured":"(2021, July 12). Contagio Malware Dump. Available online: https:\/\/www.impactcybertrust.org\/dataset_view?idDataset=1273."},{"key":"ref_69","unstructured":"VirusShare (2021, July 09). VirusShare.com\u2014Because Sharing is Caring. Available online: https:\/\/virusshare.com\/login."},{"key":"ref_70","unstructured":"AndroZoo (2021, July 09). AndroZoo Access Conditions. Available online: https:\/\/androzoo.uni.lu\/access."},{"key":"ref_71","unstructured":"Impact Cyber Trust (2021, July 09). The Drebin Dataset. Available online: https:\/\/www.impactcybertrust.org\/dataset_view?idDataset=1372."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"e164","DOI":"10.1002\/spy2.164","article-title":"Android Permission Classifier: A deep learning algorithmic framework based on protection and threat levels","volume":"4","author":"Ashawa","year":"2021","journal-title":"Secur. Priv."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"3797","DOI":"10.1109\/TIT.2014.2320500","article-title":"R\u00e9nyi Divergence and Kullback\u2014Leibler Divergence","volume":"60","year":"2014","journal-title":"IEEE Trans. Inform. Theory"},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"1175","DOI":"10.1109\/TMTT.2010.2045536","article-title":"The Barnes\u2013Hut Hierarchical Center-of-Charge Approximation for Fast Capacitance Extraction in Multilayered Media","volume":"58","author":"Aronsson","year":"2010","journal-title":"IEEE Trans. Microw. Theory Tech."},{"key":"ref_75","first-page":"975","article-title":"Data and Information Visualization Methods, and Interactive Mechanisms: A Survey","volume":"34","author":"Khan","year":"2011","journal-title":"Int. J. Comput. Appl."},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Myasnikov, E. (2021, January 24\u201326). Nearest Neighbor Search in Hyperspectral Data Using Binary Space Partitioning Trees. Proceedings of the 11th Workshop on Hyperspectral Imaging and Signal Processing: Evolution in Remote Sensing (WHISPERS), Amsterdam, The Netherlands.","DOI":"10.1109\/WHISPERS52202.2021.9484041"},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Nielsen, F. (July, January 28). Bregman vantage point trees for efficient nearest neighbor queries. Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, New York, NY, USA.","DOI":"10.1109\/ICME.2009.5202635"},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.neunet.2012.09.018","article-title":"Essentials of the self-organizing map","volume":"37","author":"Kohonen","year":"2013","journal-title":"Neural Netw."},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Manera, M. (2021). Exploratory Factor Analysis of Rainbow Trout Serum Chemistry Variables. Int. J. Environ. Res. Public Health, 18.","DOI":"10.3390\/ijerph18041537"},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Viloria, A., Bucci, N., Luna, M., Lis-Guti\u00e9rrez, J.-P., Parody, A., Bent, D.E.S., and L\u00f3pez, L.A.B. (2018). Determination of Dimensionality of the Psychosocial Risk Assessment of Internal, Individual, Double Presence and External Factors in Work Environments, Springer.","DOI":"10.1007\/978-3-319-93803-5_29"},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1525\/collabra.78","article-title":"Bayesian Inference for Correlations in the Presence of Measurement Error and Estimation Uncertainty","volume":"3","author":"Matzke","year":"2017","journal-title":"Collabra Psychol."},{"key":"ref_82","unstructured":"Tan, P., and Filter, A.P. (2010, January 7\u20139). An Adaptive Particle Filter Based on Posterior. Proceedings of the 2010 8th World Congress on Intelligent Control and Automation, Jinan, China."},{"key":"ref_83","unstructured":"An, E., and Ctor, I. (2021). Modeling heavy-tailed bounded data by the trapezoidal beta distribution with applications. Revstat. Appear, 1\u201319."},{"key":"ref_84","unstructured":"Tonhauser, J., and Matthewson, L. (2015). Empirical Evidence in Research on Meaning. [Master\u2019s Thesis, The Ohio State University and University of British Columbia]."},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"592","DOI":"10.1016\/j.jvb.2012.02.001","article-title":"Managerial career patterns: A review of the empirical evidence","volume":"80","author":"Vinkenburg","year":"2012","journal-title":"J. Vocat. Behav."},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"1352","DOI":"10.1080\/03610918.2012.659824","article-title":"Testing Goodness of Fit of Parametric AFT and PH Models with Residuals","volume":"42","author":"Balakrishnan","year":"2013","journal-title":"Commun. Stat. Simul. Comput."},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"110163","DOI":"10.1016\/j.jenvman.2020.110163","article-title":"Sustainability efficiency and carbon inequality of the Chinese transportation system: A Robust Bayesian Stochastic Frontier Analysis","volume":"260","author":"Wanke","year":"2020","journal-title":"J. Environ. Manag."},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Zhang, J.-T., Zhou, B., Guo, J., Liu, X., and Ibm, X.-A. (2016). A Modified Bartlett Test for Heteroscedastic Two-way MANOVA. J. Adv. Stat., 1.","DOI":"10.22606\/jas.2016.12006"},{"key":"ref_89","unstructured":"Niemi, J. (2015). Parameter Estimation. Norm. Model, 1\u201335."},{"key":"ref_90","first-page":"1269","article-title":"Testing homogeneity of variances with unequal sample sizes","volume":"28","year":"2012","journal-title":"Comput. Stat."},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Sataeva, T.S., and Lemeshko, B.Y. (2016, January 1\u20133). About properties and power of classical tests of homogeneity of variances. Proceedings of the 2016 11th International Forum on Strategic Technology (IFOST), Novosibirsk, Russia.","DOI":"10.1109\/IFOST.2016.7884125"},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"1788","DOI":"10.1109\/TIP.2010.2097272","article-title":"Homogeneity Localization Using Particle Filters with Application to Noise Estimation","volume":"20","author":"Ghazal","year":"2010","journal-title":"IEEE Trans. Image Process."},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1186\/s40246-019-0228-0","article-title":"An embedded method for gene identification problems involving unwanted data heterogeneity","volume":"13","author":"Lu","year":"2019","journal-title":"Hum. Genom."},{"key":"ref_94","unstructured":"Kumar, K. (2012). A Beginner\u2019s Guide to Structural Equation Modeling, Psychology Press. [3rd ed.]. no. 3."},{"key":"ref_95","unstructured":"Jacobs, R., Smith, P., and Goddard, M. (2004). CENTRE FOR H EALTH E CONOMICS Measuring performance: An Examination of Composite Performance Indicators, Centre of Health Economics, University of York."},{"key":"ref_96","unstructured":"Hoskins, T.J. (2019). Proofs of the Twin Primes and Goldbach Conjectures. arXiv, 1\u201333."},{"key":"ref_97","doi-asserted-by":"crossref","unstructured":"Robert, C., Chopin, N., and Rousseau, J. (2009). Harold Jeffreys\u2019s Theory of Probability Revisited. Stat. Sci., 24.","DOI":"10.1214\/09-STS284"},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1109\/TMI.2018.2863670","article-title":"Convolutional Recurrent Neural Networks for Dynamic MR Image Reconstruction","volume":"38","author":"Qin","year":"2018","journal-title":"IEEE Trans. Med Imaging"},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"2186","DOI":"10.1152\/jn.90727.2008","article-title":"Bayesian Correction for Attenuation of Correlation in Multi-Trial Spike Count Data","volume":"101","author":"Behseta","year":"2009","journal-title":"J. Neurophysiol."}],"container-title":["Journal of Cybersecurity and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2624-800X\/1\/4\/35\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:38:06Z","timestamp":1760168286000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2624-800X\/1\/4\/35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,30]]},"references-count":99,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2021,12]]}},"alternative-id":["jcp1040035"],"URL":"https:\/\/doi.org\/10.3390\/jcp1040035","relation":{},"ISSN":["2624-800X"],"issn-type":[{"value":"2624-800X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,30]]}}}