{"id":"https://openalex.org/W4391164072","doi":"https://doi.org/10.1109/access.2024.3357944","title":"Intelligent Pattern Recognition Using Equilibrium Optimizer With Deep Learning Model for Android Malware Detection","display_name":"Intelligent Pattern Recognition Using Equilibrium Optimizer With Deep Learning Model for Android Malware Detection","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4391164072","doi":"https://doi.org/10.1109/access.2024.3357944"},"language":"en","primary_location":{"id":"doi:10.1109/access.2024.3357944","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3357944","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10413469.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10413469.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030631880","display_name":"Mohammed Maray","orcid":null},"institutions":[{"id":"https://openalex.org/I82952536","display_name":"King Khalid University","ror":"https://ror.org/052kwzs30","country_code":"SA","type":"education","lineage":["https://openalex.org/I82952536"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Mohammed Maray","raw_affiliation_strings":["Department of Information Systems, College of Computer Science, King Khalid University, Abha, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems, College of Computer Science, King Khalid University, Abha, Saudi Arabia","institution_ids":["https://openalex.org/I82952536"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009368063","display_name":"Mashael Maashi","orcid":"https://orcid.org/0000-0003-0446-5430"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mashael Maashi","raw_affiliation_strings":["Department of Software Engineering, College of Computer and Information Sciences, King Saud University, P.O. Box 103786, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Software Engineering, College of Computer and Information Sciences, King Saud University, P.O. Box 103786, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102930174","display_name":"Haya Mesfer Alshahrani","orcid":null},"institutions":[{"id":"https://openalex.org/I106778892","display_name":"Princess Nourah bint Abdulrahman University","ror":"https://ror.org/05b0cyh02","country_code":"SA","type":"education","lineage":["https://openalex.org/I106778892"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Haya Mesfer Alshahrani","raw_affiliation_strings":["Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I106778892"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004658615","display_name":"Sumayh S. Aljameel","orcid":"https://orcid.org/0000-0001-8246-4658"},"institutions":[{"id":"https://openalex.org/I4210143841","display_name":"Saudi Aramco (Saudi Arabia)","ror":"https://ror.org/03ypap427","country_code":"SA","type":"company","lineage":["https://openalex.org/I4210143841"]},{"id":"https://openalex.org/I76571253","display_name":"Imam Abdulrahman Bin Faisal University","ror":"https://ror.org/038cy8j79","country_code":"SA","type":"education","lineage":["https://openalex.org/I76571253"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Sumayh S. Aljameel","raw_affiliation_strings":["Department of Computer Science, Saudi Aramco Cybersecurity Chair, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia","SAUDI ARAMCO Cybersecurity Chair, Department of Computer Science, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Saudi Aramco Cybersecurity Chair, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia","institution_ids":["https://openalex.org/I76571253"]},{"raw_affiliation_string":"SAUDI ARAMCO Cybersecurity Chair, Department of Computer Science, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam, Saudi Arabia","institution_ids":["https://openalex.org/I4210143841","https://openalex.org/I76571253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007209380","display_name":"Sitelbanat Abdelbagi","orcid":"https://orcid.org/0009-0008-1996-325X"},"institutions":[{"id":"https://openalex.org/I142608572","display_name":"Prince Sattam Bin Abdulaziz University","ror":"https://ror.org/04jt46d36","country_code":"SA","type":"education","lineage":["https://openalex.org/I142608572"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Sitelbanat Abdelbagi","raw_affiliation_strings":["Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, Al-Kharj, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, Al-Kharj, Saudi Arabia","institution_ids":["https://openalex.org/I142608572"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024079346","display_name":"Ahmed S. Salama","orcid":"https://orcid.org/0000-0002-1066-8261"},"institutions":[{"id":"https://openalex.org/I186217134","display_name":"Future University in Egypt","ror":"https://ror.org/03s8c2x09","country_code":"EG","type":"education","lineage":["https://openalex.org/I186217134"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Ahmed S. Salama","raw_affiliation_strings":["Department of Electrical Engineering, Faculty of Engineering and Technology, Future University in Egypt, New Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Faculty of Engineering and Technology, Future University in Egypt, New Cairo, Egypt","institution_ids":["https://openalex.org/I186217134"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5030631880"],"corresponding_institution_ids":["https://openalex.org/I82952536"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":4.5556,"has_fulltext":true,"cited_by_count":13,"citation_normalized_percentile":{"value":0.95177463,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"12","issue":null,"first_page":"24516","last_page":"24524"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9706000089645386,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12799","display_name":"Mobile and Web Applications","score":0.9646000266075134,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8409970998764038},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8387082815170288},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7932077646255493},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.64436936378479},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5685582756996155},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5565080642700195},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.522883415222168},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.46218833327293396},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.41607749462127686},{"id":"https://openalex.org/keywords/system-call","display_name":"System call","score":0.4154418706893921},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.41529133915901184},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3479762375354767},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.33189600706100464}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8409970998764038},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8387082815170288},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7932077646255493},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.64436936378479},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5685582756996155},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5565080642700195},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.522883415222168},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.46218833327293396},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.41607749462127686},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.4154418706893921},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.41529133915901184},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3479762375354767},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.33189600706100464}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2024.3357944","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3357944","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10413469.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:fd64be688af048a081d76e7077eab873","is_oa":true,"landing_page_url":"https://doaj.org/article/fd64be688af048a081d76e7077eab873","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 12, Pp 24516-24524 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2024.3357944","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3357944","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10413469.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1120136027","display_name":null,"funder_award_id":"RGP2/248/44","funder_id":"https://openalex.org/F4320324433","funder_display_name":"King Khalid University"},{"id":"https://openalex.org/G2246833281","display_name":null,"funder_award_id":"PSAU/2023/R/1444","funder_id":"https://openalex.org/F4320311227","funder_display_name":"Prince Sattam bin Abdulaziz University"},{"id":"https://openalex.org/G5297840800","display_name":null,"funder_award_id":"RGP2/ 248 /44","funder_id":"https://openalex.org/F4320324433","funder_display_name":"King Khalid University"}],"funders":[{"id":"https://openalex.org/F4320311227","display_name":"Prince Sattam bin Abdulaziz University","ror":"https://ror.org/04jt46d36"},{"id":"https://openalex.org/F4320321145","display_name":"King Saud University","ror":"https://ror.org/02f81g417"},{"id":"https://openalex.org/F4320322484","display_name":"Princess Nourah Bint Abdulrahman University","ror":"https://ror.org/05b0cyh02"},{"id":"https://openalex.org/F4320324433","display_name":"King Khalid University","ror":"https://ror.org/052kwzs30"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4391164072.pdf","grobid_xml":"https://content.openalex.org/works/W4391164072.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W907501016","https://openalex.org/W3161054997","https://openalex.org/W3161331107","https://openalex.org/W3177025178","https://openalex.org/W3192974536","https://openalex.org/W3215345317","https://openalex.org/W4205876068","https://openalex.org/W4221025359","https://openalex.org/W4280590592","https://openalex.org/W4311045424","https://openalex.org/W4312334973","https://openalex.org/W4313302904","https://openalex.org/W4313406927","https://openalex.org/W4319596448","https://openalex.org/W4323655380","https://openalex.org/W4327939473","https://openalex.org/W4367182741","https://openalex.org/W4383899490","https://openalex.org/W4385368987","https://openalex.org/W4385518129","https://openalex.org/W6797607759"],"related_works":["https://openalex.org/W2439951656","https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W1573526548","https://openalex.org/W2591124010","https://openalex.org/W3200508744","https://openalex.org/W3025122950","https://openalex.org/W2717179875","https://openalex.org/W4249118297","https://openalex.org/W2291798086"],"abstract_inverted_index":{"Android":[0,16,30,46,58,97,150,166,212,249,265],"malware":[1,40,47,59,167,250,266],"recognition":[2,210],"is":[3,36,48,159],"the":[4,29,37,70,127,156,165,178,181,197,209,216,219,222,226,232,240,256,260,264],"procedure":[5],"of":[6,39,72,129,155,211,218,239,259],"mitigating":[7],"and":[8,26,55,82,94,113,122,163],"identifying":[9],"malicious":[10,123],"software":[11],"(malware)":[12],"planned":[13],"to":[14,33,160,187,263],"target":[15],"operating":[17],"systems":[18],"(OS)":[19],"that":[20,172],"are":[21,87,117],"extremely":[22],"utilized":[23],"in":[24,89,96,126,168],"smartphones":[25],"tablets.":[27],"As":[28],"ecosystem":[31],"endures":[32],"produce,":[34],"therefore":[35],"risk":[38],"attacks":[41],"on":[42,246],"these":[43,115],"devices.":[44,74],"Identifying":[45],"vital":[49],"for":[50,69,149,208,231],"keeping":[51],"user":[52],"data,":[53],"privacy,":[54],"device":[56],"integrity.":[57],"detection":[60,267],"utilizing":[61],"deep":[62],"learning":[63],"(DL)":[64],"signifies":[65],"a":[66,170,192,247],"cutting-edge":[67],"system":[68,224],"maintenance":[71],"mobile":[73],"DL":[75],"approaches":[76,116],"namely":[77],"recurrent":[78],"neural":[79,84],"network":[80,85],"(RNN)":[81],"convolutional":[83],"(CNN)":[86],"best":[88],"automatically":[90],"removing":[91],"intricate":[92],"designs":[93],"behaviors":[95],"app":[98],"data.":[99],"By":[100],"leveraging":[101],"features":[102],"such":[103,169],"as":[104],"application":[105],"programming":[106],"interface":[107],"(API)":[108],"call":[109],"sequences,":[110],"code":[111],"patterns,":[112],"permissions,":[114],"efficiently":[118],"differentiated":[119],"between":[120],"benign":[121],"apps,":[124],"even":[125],"face":[128],"previous":[130],"unseen":[131],"attacks.":[132],"This":[133],"study":[134],"presents":[135],"an":[136,141],"Intelligent":[137],"Pattern":[138],"Recognition":[139],"using":[140],"Equilibrium":[142,227],"Optimizer":[143],"with":[144],"Deep":[145],"Learning":[146],"(IPR-EODL)":[147],"Approach":[148],"Malware":[151],"Recognition.":[152],"The":[153,236,252],"purpose":[154],"IPR-EODL":[157,179,198,223,241,261],"approach":[158,262],"properly":[161],"identify":[162],"categorize":[164],"way":[171],"security":[173],"can":[174,243],"be":[175,244],"achieved.":[176],"In":[177,195],"technique,":[180],"data":[182,190],"pre-processing":[183],"step":[184],"was":[185],"applied":[186],"convert":[188],"input":[189],"into":[191],"compatible":[193],"setup.":[194],"addition,":[196],"technique":[199],"applies":[200],"channel":[201],"attention":[202],"long":[203],"short-term":[204],"memory":[205],"(CA-LSTM)":[206],"methodology":[207],"malware.":[213],"To":[214],"enhance":[215],"solution":[217],"CA-LSTM":[220],"algorithm,":[221],"employs":[225],"optimization":[228],"(EO)":[229],"algorithm":[230],"hyperparameter":[233],"tuning":[234],"method.":[235],"experimentation":[237],"evaluation":[238],"model":[242],"verified":[245],"benchmark":[248],"database.":[251],"extensive":[253],"results":[254],"highlight":[255],"significant":[257],"result":[258],"process.":[268]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
