{"id":"https://openalex.org/W7123351690","doi":"https://doi.org/10.1109/access.2026.3651861","title":"Android Malware Detection Using API Calls and Permissions With Random Forest Classifier","display_name":"Android Malware Detection Using API Calls and Permissions With Random Forest Classifier","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7123351690","doi":"https://doi.org/10.1109/access.2026.3651861"},"language":null,"primary_location":{"id":"doi:10.1109/access.2026.3651861","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3651861","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2026.3651861","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5122899513","display_name":"Abdul Museeb","orcid":null},"institutions":[{"id":"https://openalex.org/I203899302","display_name":"Universiti Teknologi Petronas","ror":"https://ror.org/048g2sh07","country_code":"MY","type":"education","lineage":["https://openalex.org/I203899302"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Abdul Museeb","raw_affiliation_strings":["Department of Applied Sciences, Universiti Teknologi PETRONAS, Seri Iskandar, Perak, Malaysia"],"affiliations":[{"raw_affiliation_string":"Department of Applied Sciences, Universiti Teknologi PETRONAS, Seri Iskandar, Perak, Malaysia","institution_ids":["https://openalex.org/I203899302"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122897058","display_name":"Yaman Hamed","orcid":null},"institutions":[{"id":"https://openalex.org/I203899302","display_name":"Universiti Teknologi Petronas","ror":"https://ror.org/048g2sh07","country_code":"MY","type":"education","lineage":["https://openalex.org/I203899302"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Yaman Hamed","raw_affiliation_strings":["Department of Applied Sciences, Universiti Teknologi PETRONAS, Seri Iskandar, Perak, Malaysia"],"affiliations":[{"raw_affiliation_string":"Department of Applied Sciences, Universiti Teknologi PETRONAS, Seri Iskandar, Perak, Malaysia","institution_ids":["https://openalex.org/I203899302"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017357127","display_name":"Yahia Baashar","orcid":"https://orcid.org/0000-0002-8004-3929"},"institutions":[{"id":"https://openalex.org/I161371597","display_name":"Universiti of Malaysia Sabah","ror":"https://ror.org/040v70252","country_code":"MY","type":"education","lineage":["https://openalex.org/I161371597"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Yahia Baashar","raw_affiliation_strings":["Faculty of Computing and Informatics, Universiti Malaysia Sabah (UMS), Labuan, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Computing and Informatics, Universiti Malaysia Sabah (UMS), Labuan, Malaysia","institution_ids":["https://openalex.org/I161371597"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056101936","display_name":"Abdulkarim Kanaan-Jebna","orcid":"https://orcid.org/0000-0002-9007-5107"},"institutions":[{"id":"https://openalex.org/I931681460","display_name":"Universiti Tunku Abdul Rahman","ror":"https://ror.org/050pq4m56","country_code":"MY","type":"education","lineage":["https://openalex.org/I931681460"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Abdulkarim M. Jamal Kanaan-Jebna","raw_affiliation_strings":["Faculty of Information and Communication Technology, Universiti Tunku Abdul Rahman, Kampar, Perak, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Information and Communication Technology, Universiti Tunku Abdul Rahman, Kampar, Perak, Malaysia","institution_ids":["https://openalex.org/I931681460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060564273","display_name":"Anis Amazigh Hamza","orcid":"https://orcid.org/0000-0002-5181-0869"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I4210093397","display_name":"XLIM","ror":"https://ror.org/00f7srh09","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I32881790","https://openalex.org/I4210093397","https://openalex.org/I4210095849","https://openalex.org/I65806277"]},{"id":"https://openalex.org/I65806277","display_name":"Universit\u00e9 de Limoges","ror":"https://ror.org/02cp04407","country_code":"FR","type":"education","lineage":["https://openalex.org/I65806277"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Anis Amazigh Hamza","raw_affiliation_strings":["XLIM, UMR CNRS 7252, SRI (Smart Systems and Network), University of Limoges, Limoges Cedex, France"],"affiliations":[{"raw_affiliation_string":"XLIM, UMR CNRS 7252, SRI (Smart Systems and Network), University of Limoges, Limoges Cedex, France","institution_ids":["https://openalex.org/I65806277","https://openalex.org/I4210093397","https://openalex.org/I1294671590"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044659591","display_name":"Rajalingam Sokkalingam","orcid":"https://orcid.org/0000-0002-3747-8695"},"institutions":[{"id":"https://openalex.org/I203899302","display_name":"Universiti Teknologi Petronas","ror":"https://ror.org/048g2sh07","country_code":"MY","type":"education","lineage":["https://openalex.org/I203899302"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Rajalingam Sokkalingam","raw_affiliation_strings":["Department of Applied Sciences, Universiti Teknologi PETRONAS, Seri Iskandar, Perak, Malaysia"],"affiliations":[{"raw_affiliation_string":"Department of Applied Sciences, Universiti Teknologi PETRONAS, Seri Iskandar, Perak, Malaysia","institution_ids":["https://openalex.org/I203899302"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5122899513"],"corresponding_institution_ids":["https://openalex.org/I203899302"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08198519,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":null,"first_page":"6464","last_page":"6480"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9883000254631042,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9883000254631042,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.0020000000949949026,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.0008999999845400453,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8015000224113464},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7940000295639038},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.7577000260353088},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5386000275611877},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.4945000112056732},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.446399986743927},{"id":"https://openalex.org/keywords/dimensionality-reduction","display_name":"Dimensionality reduction","score":0.4034000039100647},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.37610000371932983}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8644999861717224},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8015000224113464},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7940000295639038},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.7577000260353088},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5386000275611877},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.4945000112056732},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4772000014781952},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.446399986743927},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4287000000476837},{"id":"https://openalex.org/C70518039","wikidata":"https://www.wikidata.org/wiki/Q16000077","display_name":"Dimensionality reduction","level":2,"score":0.4034000039100647},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.37610000371932983},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3725999891757965},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.36640000343322754},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.36469998955726624},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.3434000015258789},{"id":"https://openalex.org/C111030470","wikidata":"https://www.wikidata.org/wiki/Q1430460","display_name":"Curse of dimensionality","level":2,"score":0.33820000290870667},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.3107999861240387},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.2971000075340271},{"id":"https://openalex.org/C27438332","wikidata":"https://www.wikidata.org/wiki/Q2873","display_name":"Principal component analysis","level":2,"score":0.289000004529953},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.27079999446868896},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.2632000148296356},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.2612999975681305},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.257999986410141}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/access.2026.3651861","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3651861","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/access.2026.3651861","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3651861","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2047662713","display_name":null,"funder_award_id":"(YUTP-Cost Centre: 015LC0-533)","funder_id":"https://openalex.org/F4320323380","funder_display_name":"Universiti Teknologi Petronas"},{"id":"https://openalex.org/G7270788967","display_name":null,"funder_award_id":"015LC0-533","funder_id":"https://openalex.org/F4320323380","funder_display_name":"Universiti Teknologi Petronas"}],"funders":[{"id":"https://openalex.org/F4320323380","display_name":"Universiti Teknologi Petronas","ror":"https://ror.org/048g2sh07"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W2060537671","https://openalex.org/W2087970742","https://openalex.org/W2128064123","https://openalex.org/W2343325785","https://openalex.org/W2407059953","https://openalex.org/W2487124337","https://openalex.org/W2783327762","https://openalex.org/W2792310543","https://openalex.org/W2906631928","https://openalex.org/W2911956266","https://openalex.org/W2963003683","https://openalex.org/W3039088822","https://openalex.org/W3145971023","https://openalex.org/W3158714349","https://openalex.org/W3173040539","https://openalex.org/W3198776231","https://openalex.org/W3212721454","https://openalex.org/W4211249255","https://openalex.org/W4281724499","https://openalex.org/W4283387673","https://openalex.org/W4288770392","https://openalex.org/W4288780798","https://openalex.org/W4308030886","https://openalex.org/W4321021238","https://openalex.org/W4386736694","https://openalex.org/W4389888171","https://openalex.org/W4396506213","https://openalex.org/W4403864395","https://openalex.org/W4408399910","https://openalex.org/W4409280760","https://openalex.org/W4413213075"],"related_works":[],"abstract_inverted_index":{"Android":[0,52,93,112,179],"malware":[1,53,180],"poses":[2],"a":[3,47,56,139],"persistent":[4],"and":[5,19,69,99,114,122,148,170],"evolving":[6],"threat":[7,115],"to":[8,14,71,131],"mobile":[9],"security,":[10],"considering":[11],"its":[12],"capability":[13],"compromise":[15],"sensitive":[16],"user":[17],"data":[18,101,165],"evade":[20],"traditional":[21],"detection":[22,54,140],"methods.":[23],"While":[24],"signature-based":[25],"approaches":[26],"remain":[27],"effective":[28],"against":[29,35],"known":[30],"threats,":[31],"they":[32],"often":[33],"fail":[34],"obfuscated":[36],"or":[37],"zero-day":[38],"malware.":[39],"To":[40],"address":[41],"this":[42,44,154],"challenge,":[43],"paper":[45],"presents":[46],"machine":[48],"learning-based":[49],"framework":[50],"for":[51,178],"using":[55,119],"random":[57],"forest":[58],"classifier.":[59],"The":[60,135,151],"proposed":[61],"method":[62],"leverages":[63],"static":[64],"features":[65],"(specifically":[66],"API":[67,90],"calls":[68],"permissions)":[70],"characterize":[72],"application":[73],"behaviour":[74],"without":[75],"requiring":[76],"code":[77],"execution.":[78],"A":[79],"comprehensive":[80],"dataset":[81],"was":[82,129],"constructed":[83],"by":[84],"integrating":[85],"labelled":[86],"samples":[87],"from":[88,92,102],"CIC-AndMal2017,":[89],"details":[91],"Studio":[94],"SDK":[95],"(API":[96,105],"levels":[97,106],"15\u201334),":[98],"legacy":[100],"GitHub":[103],"repositories":[104],"1\u201314),":[107],"ensuring":[108],"wide":[109],"coverage":[110],"of":[111,142,153,163],"versions":[113],"patterns.":[116],"Feature":[117],"selection":[118],"correlation":[120],"analysis":[121,128],"dimensionality":[123],"reduction":[124],"via":[125],"principal":[126],"component":[127],"employed":[130],"optimize":[132],"the":[133,161],"model.":[134],"resulting":[136],"classifier":[137],"achieved":[138],"accuracy":[141],"95%,":[143],"demonstrating":[144],"both":[145],"high":[146],"performance":[147],"computational":[149],"efficiency.":[150],"strength":[152],"work":[155],"can":[156],"be":[157],"summarized":[158],"in":[159,173],"highlighting":[160],"value":[162],"multi-source":[164],"integration,":[166],"informed":[167],"feature":[168],"selection,":[169],"ensemble":[171],"learning":[172],"developing":[174],"scalable,":[175],"real-world":[176],"solutions":[177],"detection.":[181]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-01-14T00:00:00"}
