{"id":"https://openalex.org/W3155839992","doi":"https://doi.org/10.1109/access.2021.3071450","title":"Android Ransomware Detection Based on a Hybrid Evolutionary Approach in the Context of Highly Imbalanced Data","display_name":"Android Ransomware Detection Based on a Hybrid Evolutionary Approach in the Context of Highly Imbalanced Data","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3155839992","doi":"https://doi.org/10.1109/access.2021.3071450","mag":"3155839992"},"language":"en","primary_location":{"id":"doi:10.1109/access.2021.3071450","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3071450","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09398647.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09398647.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041848850","display_name":"Iman Almomani","orcid":"https://orcid.org/0000-0003-4639-516X"},"institutions":[{"id":"https://openalex.org/I142024983","display_name":"Prince Sultan University","ror":"https://ror.org/053mqrf26","country_code":"SA","type":"education","lineage":["https://openalex.org/I142024983"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Iman Almomani","raw_affiliation_strings":[", Department, University , , of , , , . ,","Computer Science Department, Security Engineering lab, Prince Sultan University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":", Department, University , , of , , , . ,","institution_ids":[]},{"raw_affiliation_string":"Computer Science Department, Security Engineering lab, Prince Sultan University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I142024983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044414661","display_name":"Raneem Qaddoura","orcid":"https://orcid.org/0000-0003-4093-9349"},"institutions":[{"id":"https://openalex.org/I153921779","display_name":"Philadelphia University","ror":"https://ror.org/05mqvn149","country_code":"JO","type":"education","lineage":["https://openalex.org/I153921779"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Raneem Qaddoura","raw_affiliation_strings":["Department of Information Technology, Philadelphia University, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Philadelphia University, Amman, Jordan","institution_ids":["https://openalex.org/I153921779"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020371301","display_name":"Maria Habib","orcid":"https://orcid.org/0000-0001-9642-9597"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Maria Habib","raw_affiliation_strings":[", Department, University , , of , , , . ,","Altibbi.com, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":", Department, University , , of , , , . ,","institution_ids":[]},{"raw_affiliation_string":"Altibbi.com, Amman, Jordan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077383226","display_name":"Samah Alsoghyer","orcid":"https://orcid.org/0000-0002-1970-8864"},"institutions":[{"id":"https://openalex.org/I1284598098","display_name":"King Abdulaziz City for Science and Technology","ror":"https://ror.org/05tdz6m39","country_code":"SA","type":"facility","lineage":["https://openalex.org/I1284598098"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Samah Alsoghyer","raw_affiliation_strings":[", Department, University , , of , , , . ,","King Abdulaziz City for Science & Technology, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":", Department, University , , of , , , . ,","institution_ids":[]},{"raw_affiliation_string":"King Abdulaziz City for Science & Technology, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I1284598098"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060352940","display_name":"Aala Alkhayer","orcid":"https://orcid.org/0000-0001-7685-2689"},"institutions":[{"id":"https://openalex.org/I142024983","display_name":"Prince Sultan University","ror":"https://ror.org/053mqrf26","country_code":"SA","type":"education","lineage":["https://openalex.org/I142024983"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Alaa Al Khayer","raw_affiliation_strings":["Computer Science Department, Security Engineering lab, Prince Sultan University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Security Engineering lab, Prince Sultan University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I142024983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023882029","display_name":"Ibrahim Aljarah","orcid":"https://orcid.org/0000-0002-9265-9819"},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Ibrahim Aljarah","raw_affiliation_strings":[", Department, University , , of , , , . ,","King Abdullah II School for Information Technology, The University of Jordan, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":", Department, University , , of , , , . ,","institution_ids":[]},{"raw_affiliation_string":"King Abdullah II School for Information Technology, The University of Jordan, Amman, Jordan","institution_ids":["https://openalex.org/I114972647"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048560390","display_name":"Hossam Faris","orcid":"https://orcid.org/0000-0003-4261-8127"},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Hossam Faris","raw_affiliation_strings":[", Department, University , , of , , , . ,","King Abdullah II School for Information Technology, The University of Jordan, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":", Department, University , , of , , , . ,","institution_ids":[]},{"raw_affiliation_string":"King Abdullah II School for Information Technology, The University of Jordan, Amman, Jordan","institution_ids":["https://openalex.org/I114972647"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5041848850"],"corresponding_institution_ids":["https://openalex.org/I142024983"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":10.1824,"has_fulltext":true,"cited_by_count":83,"citation_normalized_percentile":{"value":0.98883093,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"9","issue":null,"first_page":"57674","last_page":"57691"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9757999777793884,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.944100022315979,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.9347552061080933},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7870842814445496},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6926519274711609},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5825763940811157},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.574740469455719},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.535568356513977},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.5095353722572327},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.4729211926460266},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.42498311400413513},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4148328900337219},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.41374871134757996},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19310727715492249},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10075816512107849}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.9347552061080933},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7870842814445496},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6926519274711609},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5825763940811157},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.574740469455719},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.535568356513977},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.5095353722572327},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.4729211926460266},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.42498311400413513},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4148328900337219},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.41374871134757996},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19310727715492249},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10075816512107849},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2021.3071450","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3071450","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09398647.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:07b015e0ed5f43d4887935d542240bd3","is_oa":true,"landing_page_url":"https://doaj.org/article/07b015e0ed5f43d4887935d542240bd3","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 9, Pp 57674-57691 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2021.3071450","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3071450","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09398647.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320327702","display_name":"Prince Sultan University","ror":"https://ror.org/053mqrf26"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3155839992.pdf","grobid_xml":"https://content.openalex.org/works/W3155839992.grobid-xml"},"referenced_works_count":79,"referenced_works":["https://openalex.org/W1596914020","https://openalex.org/W2087347434","https://openalex.org/W2101234009","https://openalex.org/W2104933073","https://openalex.org/W2109364787","https://openalex.org/W2125213524","https://openalex.org/W2132791018","https://openalex.org/W2147898188","https://openalex.org/W2148143831","https://openalex.org/W2165171393","https://openalex.org/W2168508521","https://openalex.org/W2295598076","https://openalex.org/W2296579688","https://openalex.org/W2521200999","https://openalex.org/W2620844046","https://openalex.org/W2780577826","https://openalex.org/W2885070483","https://openalex.org/W2889052179","https://openalex.org/W2899124034","https://openalex.org/W2903521537","https://openalex.org/W2906139053","https://openalex.org/W2906631928","https://openalex.org/W2910470804","https://openalex.org/W2941199301","https://openalex.org/W2945588808","https://openalex.org/W2945832014","https://openalex.org/W2958137588","https://openalex.org/W2963604227","https://openalex.org/W2963649998","https://openalex.org/W2966754054","https://openalex.org/W2966789963","https://openalex.org/W2973093569","https://openalex.org/W2981859286","https://openalex.org/W2984666763","https://openalex.org/W2994117628","https://openalex.org/W2996826556","https://openalex.org/W2999438024","https://openalex.org/W3000147031","https://openalex.org/W3004549544","https://openalex.org/W3006992647","https://openalex.org/W3009085355","https://openalex.org/W3009137375","https://openalex.org/W3011698498","https://openalex.org/W3013116456","https://openalex.org/W3013428842","https://openalex.org/W3014435621","https://openalex.org/W3014829096","https://openalex.org/W3016101473","https://openalex.org/W3021703528","https://openalex.org/W3022962781","https://openalex.org/W3023211159","https://openalex.org/W3028767182","https://openalex.org/W3029868457","https://openalex.org/W3033266910","https://openalex.org/W3034447669","https://openalex.org/W3036138508","https://openalex.org/W3036603968","https://openalex.org/W3038645823","https://openalex.org/W3039088822","https://openalex.org/W3040077064","https://openalex.org/W3075942746","https://openalex.org/W3083631411","https://openalex.org/W3083796308","https://openalex.org/W3092762857","https://openalex.org/W3102476541","https://openalex.org/W3112403515","https://openalex.org/W4255640940","https://openalex.org/W4287745681","https://openalex.org/W4293713156","https://openalex.org/W6675354045","https://openalex.org/W6675634716","https://openalex.org/W6679745481","https://openalex.org/W6771257467","https://openalex.org/W6775548715","https://openalex.org/W6776000252","https://openalex.org/W6778140923","https://openalex.org/W6780380098","https://openalex.org/W6782092147","https://openalex.org/W6784494120"],"related_works":["https://openalex.org/W3201228709","https://openalex.org/W2922354075","https://openalex.org/W4389157351","https://openalex.org/W4232561318","https://openalex.org/W3202245533","https://openalex.org/W4253977752","https://openalex.org/W2942879794","https://openalex.org/W1975357770","https://openalex.org/W2717179875","https://openalex.org/W4249118297"],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"Ransomware":[3,12,41,57,87,107,122],"has":[4],"been":[5],"a":[6,14,36,92,100,115],"critical":[7],"threat":[8],"that":[9,18,123],"attacks":[10,42],"smartphones.":[11],"is":[13,38,108,124,138,160,174],"kind":[15],"of":[16,27,56,63,95,109,121,144,181,187,193,212],"malware":[17,75],"blocks":[19],"the":[20,25,28,53,61,85,119,142,145,163,194,207],"mobile's":[21],"system":[22],"and":[23,50,215],"prevents":[24],"user":[26],"infected":[29],"device":[30],"from":[31,176],"accessing":[32],"their":[33,70],"data":[34],"until":[35],"ransom":[37],"paid.":[39],"Worldwide,":[40],"have":[43],"led":[44],"to":[45,60,69,83,104],"serious":[46],"losses":[47],"for":[48,118,140,169],"individuals":[49],"stakeholders.":[51],"However,":[52],"dramatic":[54],"increase":[55],"families":[58],"makes":[59],"process":[62],"identifying":[64],"them":[65,188],"more":[66],"challenging":[67],"due":[68],"continuously":[71],"evolved":[72],"characteristics.":[73],"Traditional":[74],"detection":[76,120],"methods":[77],"(e.g.,":[78],"statistical-based":[79],"prevention":[80],"methods)":[81],"fail":[82],"combat":[84],"evolving":[86],"since":[88],"they":[89],"result":[90],"in":[91,210],"high":[93],"percentage":[94],"false":[96],"positives.":[97],"Indeed,":[98],"developing":[99],"non-classical,":[101],"intelligent":[102],"technique":[103,167],"safeguarding":[105],"against":[106],"significant":[110],"importance.":[111],"This":[112],"paper":[113],"introduces":[114],"new":[116],"methodology":[117],"depending":[125],"on":[126],"an":[127],"evolutionary-based":[128],"machine":[129,202],"learning":[130,203],"approach.":[131],"The":[132,154,171,191],"binary":[133],"particle":[134],"swarm":[135],"optimization":[136],"algorithm":[137,159],"utilized":[139,172],"tuning":[141],"hyperparameters":[143],"classification":[146],"algorithm,":[147],"as":[148,150],"well":[149],"performing":[151],"feature":[152],"selection.":[153],"support":[155],"vector":[156],"machines":[157],"(SVM)":[158],"used":[161],"alongside":[162],"synthetic":[164],"minority":[165],"oversampling":[166],"(SMOTE)":[168],"classification.":[170],"dataset":[173],"collected":[175],"various":[177],"sources,":[178],"which":[179],"consists":[180],"10,153":[182],"Android":[183],"applications,":[184],"where":[185],"500":[186],"are":[189],"Ransomware.":[190],"performance":[192],"proposed":[195],"approach":[196],"SMOTE-tBPSO-SVM":[197],"achieved":[198],"merits":[199],"over":[200],"traditional":[201],"algorithms":[204],"by":[205],"having":[206],"highest":[208],"scores":[209],"terms":[211],"sensitivity,":[213],"specificity,":[214],"g-mean.":[216]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":15},{"year":2024,"cited_by_count":19},{"year":2023,"cited_by_count":23},{"year":2022,"cited_by_count":16},{"year":2021,"cited_by_count":8}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
