{"id":"https://openalex.org/W4360585235","doi":"https://doi.org/10.1109/ic3i56241.2022.10073337","title":"Detecting Android Malware and Sensitive Data Flows Using Machine Learning Techniques","display_name":"Detecting Android Malware and Sensitive Data Flows Using Machine Learning Techniques","publication_year":2022,"publication_date":"2022-12-14","ids":{"openalex":"https://openalex.org/W4360585235","doi":"https://doi.org/10.1109/ic3i56241.2022.10073337"},"language":"en","primary_location":{"id":"doi:10.1109/ic3i56241.2022.10073337","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3i56241.2022.10073337","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072261829","display_name":"Ramakrishnan Raman","orcid":"https://orcid.org/0000-0003-3642-6989"},"institutions":[{"id":"https://openalex.org/I244572783","display_name":"Symbiosis International University","ror":"https://ror.org/005r2ww51","country_code":"IN","type":"education","lineage":["https://openalex.org/I244572783"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Ramakrishnan Raman","raw_affiliation_strings":["Symbiosis Institute of Business Management Pune &#x0026; Symbiosis International (Deemed University),Pune,Maharashtra,India"],"affiliations":[{"raw_affiliation_string":"Symbiosis Institute of Business Management Pune &#x0026; Symbiosis International (Deemed University),Pune,Maharashtra,India","institution_ids":["https://openalex.org/I244572783"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028915851","display_name":"Khyati R. Nirmal","orcid":"https://orcid.org/0000-0003-4575-5805"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Khyati R. Nirmal","raw_affiliation_strings":["SNJB&#x2019;S Late Sau. KBJ College of Engineering,Department of Computer Engineering,Chandwad Dist.,Nashik"],"affiliations":[{"raw_affiliation_string":"SNJB&#x2019;S Late Sau. KBJ College of Engineering,Department of Computer Engineering,Chandwad Dist.,Nashik","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101470120","display_name":"Anita Gehlot","orcid":"https://orcid.org/0000-0001-6463-9581"},"institutions":[{"id":"https://openalex.org/I3132702812","display_name":"Uttaranchal University","ror":"https://ror.org/00ba6pg24","country_code":"IN","type":"education","lineage":["https://openalex.org/I3132702812"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Anita Gehlot","raw_affiliation_strings":["Uttaranchal Institute of Technology Uttaranchal University,Dehradun,Uttarakhand,India","Uttaranchal Institute of Technology Uttaranchal University, Dehradun, Uttarakhand, India"],"affiliations":[{"raw_affiliation_string":"Uttaranchal Institute of Technology Uttaranchal University,Dehradun,Uttarakhand,India","institution_ids":["https://openalex.org/I3132702812"]},{"raw_affiliation_string":"Uttaranchal Institute of Technology Uttaranchal University, Dehradun, Uttarakhand, India","institution_ids":["https://openalex.org/I3132702812"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009231088","display_name":"Snehal Trivedi","orcid":null},"institutions":[{"id":"https://openalex.org/I9694494","display_name":"Parul University","ror":"https://ror.org/024v3fg07","country_code":"IN","type":"education","lineage":["https://openalex.org/I9694494"]},{"id":"https://openalex.org/I4210112983","display_name":"Parul University","ror":null,"country_code":"IN","type":null,"lineage":["https://openalex.org/I4210112983"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Snehal Trivedi","raw_affiliation_strings":["Parul University,Department of Mech,Gujarat,India","Department of Mech, Parul University, Gujarat, India"],"affiliations":[{"raw_affiliation_string":"Parul University,Department of Mech,Gujarat,India","institution_ids":["https://openalex.org/I4210112983"]},{"raw_affiliation_string":"Department of Mech, Parul University, Gujarat, India","institution_ids":["https://openalex.org/I9694494"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057715756","display_name":"Dimple Sain","orcid":null},"institutions":[{"id":"https://openalex.org/I4210115345","display_name":"Sri Balaji Vidyapeeth University","ror":"https://ror.org/02avh2k34","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210115345"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dimple Sain","raw_affiliation_strings":["Sri Balaji University Pune (SBUP),Department of Operations &#x0026; SCM"],"affiliations":[{"raw_affiliation_string":"Sri Balaji University Pune (SBUP),Department of Operations &#x0026; SCM","institution_ids":["https://openalex.org/I4210115345"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102720362","display_name":"R. Ponnusamy","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"R. Ponnusamy","raw_affiliation_strings":["Chennai Institute of Technology,Department of Computer Science &#x0026; Engineering,Chennai,Tamilnadu,India"],"affiliations":[{"raw_affiliation_string":"Chennai Institute of Technology,Department of Computer Science &#x0026; Engineering,Chennai,Tamilnadu,India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5072261829"],"corresponding_institution_ids":["https://openalex.org/I244572783"],"apc_list":null,"apc_paid":null,"fwci":0.2972,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.54070453,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1694","last_page":"1698"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.9724000096321106,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8848870992660522},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7947355508804321},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.788802981376648},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7852302193641663},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.6758874654769897},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5635241270065308},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.5279924869537354},{"id":"https://openalex.org/keywords/categorization","display_name":"Categorization","score":0.45853835344314575},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.43406134843826294},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.42073068022727966},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.397217333316803},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.39121946692466736},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3179519772529602},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.24996289610862732}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8848870992660522},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7947355508804321},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.788802981376648},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7852302193641663},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.6758874654769897},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5635241270065308},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.5279924869537354},{"id":"https://openalex.org/C94124525","wikidata":"https://www.wikidata.org/wiki/Q912550","display_name":"Categorization","level":2,"score":0.45853835344314575},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.43406134843826294},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.42073068022727966},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.397217333316803},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39121946692466736},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3179519772529602},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.24996289610862732}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3i56241.2022.10073337","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3i56241.2022.10073337","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7300000190734863,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W2037026906","https://openalex.org/W2048715902","https://openalex.org/W2070386561","https://openalex.org/W2291014553","https://openalex.org/W2487124337","https://openalex.org/W2559109171","https://openalex.org/W2744097819","https://openalex.org/W2751702350","https://openalex.org/W2765329640","https://openalex.org/W2853432192","https://openalex.org/W2964240723","https://openalex.org/W2982413766","https://openalex.org/W2982657588","https://openalex.org/W2996908335","https://openalex.org/W3023529621","https://openalex.org/W3089189066","https://openalex.org/W3153045320","https://openalex.org/W3191606084","https://openalex.org/W4214877194","https://openalex.org/W4239799938","https://openalex.org/W4245027182","https://openalex.org/W4281293216","https://openalex.org/W6743375288","https://openalex.org/W6799598741"],"related_works":["https://openalex.org/W4249118297","https://openalex.org/W2717179875","https://openalex.org/W2311926078","https://openalex.org/W3199551743","https://openalex.org/W4281384336","https://openalex.org/W3195586271","https://openalex.org/W2782775281","https://openalex.org/W4312234627","https://openalex.org/W2781346976","https://openalex.org/W2899262475"],"abstract_inverted_index":{"Currently,":[0],"Android":[1,14,58,80,121],"is":[2,161],"considered":[3],"to":[4,12,29,78,111,129,132],"be":[5,30,151],"the":[6,36,71,82,113,133,154],"finest":[7],"Smartphone":[8],"operating":[9],"system.":[10],"According":[11],"statistics,":[13],"malware":[15,59,122],"has":[16,27],"sharply":[17],"expanded,":[18],"and":[19,51,67],"in":[20],"current":[21],"years,":[22],"theft":[23],"of":[24,38,70,73,92,127,145],"personal":[25],"information":[26],"grown":[28],"a":[31,85],"significant":[32],"attack":[33],"vector.":[34],"Nevertheless,":[35],"majority":[37],"detection":[39,60],"techniques":[40],"for":[41],"sensitive":[42,74,146],"data":[43,108,147],"thefts":[44],"have":[45],"specific":[46],"drawbacks,":[47],"like":[48],"computational":[49],"expense":[50],"false":[52],"positives.":[53],"This":[54],"investigation":[55],"suggests":[56],"an":[57,124],"method":[61],"that":[62,89,141],"offers":[63],"very":[64],"precise":[65],"categorization":[66],"effective":[68],"analysis":[69],"flow":[72,148],"data.":[75],"In":[76],"order":[77],"identify":[79],"malware,":[81],"research":[83],"uses":[84],"machine":[86],"learning":[87],"technique":[88],"makes":[90],"utilization":[91],"data-flow":[93,137],"application":[94],"program":[95],"interfaces":[96],"(APIs)":[97],"as":[98,103,105],"classifying":[99],"features.":[100],"1,160":[101],"benign":[102],"well":[104],"1,050":[106],"malicious":[107],"are":[109],"used":[110],"assess":[112],"suggested":[114],"strategy.":[115],"The":[116,135],"technology":[117],"can":[118,150],"detect":[119],"unidentified":[120],"with":[123],"accuracy":[125],"ratio":[126],"up":[128],"97.66%,":[130],"according":[131],"findings.":[134],"static":[136],"study":[138],"trial":[139],"demonstrates":[140],"greater":[142],"than":[143],"85%":[144],"channels":[149],"identified":[152],"employing":[153],"revised":[155],"API":[156],"subset,":[157],"while":[158],"assessment":[159],"time":[160],"reduced":[162],"by":[163],"about":[164],"40%.":[165]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
