{"id":"https://openalex.org/W7117372709","doi":"https://doi.org/10.1007/s10207-025-01190-1","title":"From code to security: machine learning approaches in android vulnerability detection","display_name":"From code to security: machine learning approaches in android vulnerability detection","publication_year":2025,"publication_date":"2025-12-27","ids":{"openalex":"https://openalex.org/W7117372709","doi":"https://doi.org/10.1007/s10207-025-01190-1"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-025-01190-1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10207-025-01190-1","pdf_url":null,"source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121397995","display_name":"Kaya Emre Arikan","orcid":null},"institutions":[{"id":"https://openalex.org/I3018710136","display_name":"Dumlupinar University","ror":"https://ror.org/03jtrja12","country_code":"TR","type":"education","lineage":["https://openalex.org/I3018710136"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Kaya Emre Arikan","raw_affiliation_strings":["Department of Information Security Engineering, Graduate School of Natural and Applied Sciences, Gazi University, Tunahan, Dumlupinar 30 Agustos Street, No:2 D8, Ankara, 06560, Turkey"],"affiliations":[{"raw_affiliation_string":"Department of Information Security Engineering, Graduate School of Natural and Applied Sciences, Gazi University, Tunahan, Dumlupinar 30 Agustos Street, No:2 D8, Ankara, 06560, Turkey","institution_ids":["https://openalex.org/I3018710136"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046318717","display_name":"Sait Melih Dogan","orcid":null},"institutions":[{"id":"https://openalex.org/I3018710136","display_name":"Dumlupinar University","ror":"https://ror.org/03jtrja12","country_code":"TR","type":"education","lineage":["https://openalex.org/I3018710136"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Sait Melih Do\u011fan","raw_affiliation_strings":["Department of Information Security Engineering, Graduate School of Natural and Applied Sciences, Gazi University, Tunahan, Dumlupinar 30 Agustos Street, No:2 D8, Ankara, 06560, Turkey"],"affiliations":[{"raw_affiliation_string":"Department of Information Security Engineering, Graduate School of Natural and Applied Sciences, Gazi University, Tunahan, Dumlupinar 30 Agustos Street, No:2 D8, Ankara, 06560, Turkey","institution_ids":["https://openalex.org/I3018710136"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035849991","display_name":"Ercan Nurcan Y\u0131lmaz","orcid":"https://orcid.org/0000-0001-9859-1600"},"institutions":[{"id":"https://openalex.org/I95634034","display_name":"Gazi University","ror":"https://ror.org/054xkpr46","country_code":"TR","type":"education","lineage":["https://openalex.org/I95634034"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Ercan Nurcan Yilmaz","raw_affiliation_strings":["Department of Electrical and Electronics Engineering, Faculty of Technology, Gazi University, Ankara, 06560, Turkey"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronics Engineering, Faculty of Technology, Gazi University, Ankara, 06560, Turkey","institution_ids":["https://openalex.org/I95634034"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5121408992","display_name":"Serkan G\u00f6nen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210091267","display_name":"Geli\u015fim \u00dcniversitesi","ror":"https://ror.org/0188hvh39","country_code":"TR","type":"education","lineage":["https://openalex.org/I4210091267"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Serkan G\u00f6nen","raw_affiliation_strings":["Department of Software Engineering, Faculty of Engineering and Architecture, Istanbul Gelisim University, Istanbul, Turkey"],"affiliations":[{"raw_affiliation_string":"Department of Software Engineering, Faculty of Engineering and Architecture, Istanbul Gelisim University, Istanbul, Turkey","institution_ids":["https://openalex.org/I4210091267"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5121397995"],"corresponding_institution_ids":["https://openalex.org/I3018710136"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.67220977,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"25","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9717000126838684,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9717000126838684,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.0044999998062849045,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.004100000020116568,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.73580002784729},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5202999711036682},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.47760000824928284},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.38760000467300415},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.3693000078201294},{"id":"https://openalex.org/keywords/application-security","display_name":"Application security","score":0.3628000020980835},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.35530000925064087},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.3547999858856201}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8278999924659729},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.73580002784729},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6055999994277954},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5202999711036682},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.47760000824928284},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.40070000290870667},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3889000117778778},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.38760000467300415},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.3693000078201294},{"id":"https://openalex.org/C77109596","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Application security","level":5,"score":0.3628000020980835},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.35530000925064087},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.3547999858856201},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.32359999418258667},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.32089999318122864},{"id":"https://openalex.org/C2780264999","wikidata":"https://www.wikidata.org/wiki/Q7445032","display_name":"Security domain","level":2,"score":0.3149999976158142},{"id":"https://openalex.org/C2988045736","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android app","level":3,"score":0.3147999942302704},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.313400000333786},{"id":"https://openalex.org/C3020250448","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Smartphone application","level":2,"score":0.2858999967575073},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.28060001134872437},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.27309998869895935},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.2639999985694885},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.2572999894618988},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.25290000438690186},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2508000135421753}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-025-01190-1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10207-025-01190-1","pdf_url":null,"source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":141,"referenced_works":["https://openalex.org/W1861808993","https://openalex.org/W2060537671","https://openalex.org/W2078197322","https://openalex.org/W2080696000","https://openalex.org/W2113115074","https://openalex.org/W2122672392","https://openalex.org/W2125011234","https://openalex.org/W2138110817","https://openalex.org/W2142245496","https://openalex.org/W2159173139","https://openalex.org/W2313513770","https://openalex.org/W2343325785","https://openalex.org/W2407313496","https://openalex.org/W2460065672","https://openalex.org/W2554148185","https://openalex.org/W2555115505","https://openalex.org/W2575599800","https://openalex.org/W2600871181","https://openalex.org/W2606250847","https://openalex.org/W2606396711","https://openalex.org/W2680688782","https://openalex.org/W2711432360","https://openalex.org/W2735790335","https://openalex.org/W2742429299","https://openalex.org/W2745087117","https://openalex.org/W2748690817","https://openalex.org/W2759023773","https://openalex.org/W2765271136","https://openalex.org/W2769942679","https://openalex.org/W2791868180","https://openalex.org/W2792347597","https://openalex.org/W2795170942","https://openalex.org/W2796200341","https://openalex.org/W2796301966","https://openalex.org/W2797862469","https://openalex.org/W2803054784","https://openalex.org/W2811320115","https://openalex.org/W2885072546","https://openalex.org/W2892636813","https://openalex.org/W2895951708","https://openalex.org/W2900918122","https://openalex.org/W2904654779","https://openalex.org/W2922440217","https://openalex.org/W2944337987","https://openalex.org/W2949639282","https://openalex.org/W2954503794","https://openalex.org/W2961642335","https://openalex.org/W2964008753","https://openalex.org/W2964144088","https://openalex.org/W2969993507","https://openalex.org/W2970433196","https://openalex.org/W2979792666","https://openalex.org/W2980227629","https://openalex.org/W2981744998","https://openalex.org/W2991199179","https://openalex.org/W2995520742","https://openalex.org/W3000629051","https://openalex.org/W3001554073","https://openalex.org/W3006837754","https://openalex.org/W3007249573","https://openalex.org/W3008371681","https://openalex.org/W3018916234","https://openalex.org/W3019514289","https://openalex.org/W3021039047","https://openalex.org/W3030957512","https://openalex.org/W3049174507","https://openalex.org/W3049398420","https://openalex.org/W3085175543","https://openalex.org/W3094075961","https://openalex.org/W3096660718","https://openalex.org/W3110800203","https://openalex.org/W3112311055","https://openalex.org/W3116489514","https://openalex.org/W3119716115","https://openalex.org/W3133304533","https://openalex.org/W3166095789","https://openalex.org/W3167400801","https://openalex.org/W3176115515","https://openalex.org/W3200506265","https://openalex.org/W3204946594","https://openalex.org/W3204960723","https://openalex.org/W3211751213","https://openalex.org/W3212484828","https://openalex.org/W4206462734","https://openalex.org/W4210664862","https://openalex.org/W4212924680","https://openalex.org/W4221098431","https://openalex.org/W4226510082","https://openalex.org/W4232918024","https://openalex.org/W4237035446","https://openalex.org/W4240187149","https://openalex.org/W4244726870","https://openalex.org/W4244727573","https://openalex.org/W4245888765","https://openalex.org/W4246247878","https://openalex.org/W4280604263","https://openalex.org/W4281385902","https://openalex.org/W4281388052","https://openalex.org/W4281778452","https://openalex.org/W4285316527","https://openalex.org/W4292491372","https://openalex.org/W4295700121","https://openalex.org/W4297819591","https://openalex.org/W4313563659","https://openalex.org/W4313886683","https://openalex.org/W4315629501","https://openalex.org/W4324057834","https://openalex.org/W4324093415","https://openalex.org/W4360981376","https://openalex.org/W4361792201","https://openalex.org/W4366208482","https://openalex.org/W4366371414","https://openalex.org/W4382300999","https://openalex.org/W4383900281","https://openalex.org/W4384030667","https://openalex.org/W4384345633","https://openalex.org/W4385283068","https://openalex.org/W4385368987","https://openalex.org/W4386081319","https://openalex.org/W4386231786","https://openalex.org/W4387156851","https://openalex.org/W4388041989","https://openalex.org/W4388945200","https://openalex.org/W4390572759","https://openalex.org/W4392481752","https://openalex.org/W4392639631","https://openalex.org/W4393435331","https://openalex.org/W4398239389","https://openalex.org/W4399115880","https://openalex.org/W4399530931","https://openalex.org/W4400108396","https://openalex.org/W4400141754","https://openalex.org/W4402070285","https://openalex.org/W4402665833","https://openalex.org/W4403159829","https://openalex.org/W4403918533","https://openalex.org/W4404029152","https://openalex.org/W4404780974","https://openalex.org/W4405399819","https://openalex.org/W4405613694","https://openalex.org/W4411453131"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-12-27T23:12:19.206068","created_date":"2025-12-27T00:00:00"}
