{"id":"https://openalex.org/W4362605382","doi":"https://doi.org/10.1109/icacs55311.2023.10089629","title":"Anti-Ant Framework for Android Malware Detection and Prevention Using Supervised Learning","display_name":"Anti-Ant Framework for Android Malware Detection and Prevention Using Supervised Learning","publication_year":2023,"publication_date":"2023-02-20","ids":{"openalex":"https://openalex.org/W4362605382","doi":"https://doi.org/10.1109/icacs55311.2023.10089629"},"language":"en","primary_location":{"id":"doi:10.1109/icacs55311.2023.10089629","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacs55311.2023.10089629","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 4th International Conference on Advancements in Computational Sciences (ICACS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004861761","display_name":"Muhammad Awais","orcid":"https://orcid.org/0000-0002-5722-5935"},"institutions":[{"id":"https://openalex.org/I142204992","display_name":"University of Lahore","ror":"https://ror.org/051jrjw38","country_code":"PK","type":"education","lineage":["https://openalex.org/I142204992"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Muhammad Awais","raw_affiliation_strings":["University Of Lahore,Computer Science &#x0026; IT department,Lahore,Pakistan"],"affiliations":[{"raw_affiliation_string":"University Of Lahore,Computer Science &#x0026; IT department,Lahore,Pakistan","institution_ids":["https://openalex.org/I142204992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030581085","display_name":"Muhammad Arham Tariq","orcid":null},"institutions":[{"id":"https://openalex.org/I192392021","display_name":"University of Central Punjab","ror":"https://ror.org/04g0mqe67","country_code":"PK","type":"education","lineage":["https://openalex.org/I192392021"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Arham Tariq","raw_affiliation_strings":["University Of Central Punjab,Computer Science &#x0026; IT department,Lahore,Pakistan"],"affiliations":[{"raw_affiliation_string":"University Of Central Punjab,Computer Science &#x0026; IT department,Lahore,Pakistan","institution_ids":["https://openalex.org/I192392021"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076952365","display_name":"Junaid Iqbal","orcid":null},"institutions":[{"id":"https://openalex.org/I142204992","display_name":"University of Lahore","ror":"https://ror.org/051jrjw38","country_code":"PK","type":"education","lineage":["https://openalex.org/I142204992"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Junaid Iqbal","raw_affiliation_strings":["University Of Lahore,Computer Science &#x0026; IT department,Lahore,Pakistan"],"affiliations":[{"raw_affiliation_string":"University Of Lahore,Computer Science &#x0026; IT department,Lahore,Pakistan","institution_ids":["https://openalex.org/I142204992"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019708523","display_name":"Yasir Masood","orcid":null},"institutions":[{"id":"https://openalex.org/I142204992","display_name":"University of Lahore","ror":"https://ror.org/051jrjw38","country_code":"PK","type":"education","lineage":["https://openalex.org/I142204992"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Yasir Masood","raw_affiliation_strings":["University Of Lahore,Computer Science &#x0026; IT department,Lahore,Pakistan"],"affiliations":[{"raw_affiliation_string":"University Of Lahore,Computer Science &#x0026; IT department,Lahore,Pakistan","institution_ids":["https://openalex.org/I142204992"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5004861761"],"corresponding_institution_ids":["https://openalex.org/I142204992"],"apc_list":null,"apc_paid":null,"fwci":1.6302,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.83912363,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.988099992275238,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8663287162780762},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7990870475769043},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6614453196525574},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.6124832630157471},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.550446629524231},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5271867513656616},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.4914008378982544},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4908338189125061},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47120827436447144},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.46279454231262207},{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.4617251753807068},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.4273822605609894},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.41428107023239136},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.19331225752830505}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8663287162780762},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7990870475769043},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6614453196525574},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.6124832630157471},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.550446629524231},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5271867513656616},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.4914008378982544},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4908338189125061},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47120827436447144},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.46279454231262207},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.4617251753807068},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.4273822605609894},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.41428107023239136},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.19331225752830505}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icacs55311.2023.10089629","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacs55311.2023.10089629","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 4th International Conference on Advancements in Computational Sciences (ICACS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6200000047683716}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2324464293","https://openalex.org/W2559689130","https://openalex.org/W2792310543","https://openalex.org/W2886064601","https://openalex.org/W2899639977","https://openalex.org/W3000800849","https://openalex.org/W3083703328","https://openalex.org/W3137440318","https://openalex.org/W3167683049","https://openalex.org/W3215280172","https://openalex.org/W4285813987","https://openalex.org/W4292117457","https://openalex.org/W4312571312","https://openalex.org/W4395700305","https://openalex.org/W6865068803"],"related_works":["https://openalex.org/W2782775281","https://openalex.org/W2395100307","https://openalex.org/W3195312353","https://openalex.org/W4308353525","https://openalex.org/W4383468964","https://openalex.org/W3200508744","https://openalex.org/W4327939473","https://openalex.org/W3195586271","https://openalex.org/W4312234627","https://openalex.org/W2507113366"],"abstract_inverted_index":{"Android":[0],"users":[1,13],"have":[2],"been":[3],"increasing":[4],"drastically":[5],"by":[6,234,241],"the":[7,19,26,72,109,112,116,121,125,164,179,193,203,211,223,229,236,257,260,273,277,284,287,294],"day,":[8],"therefore":[9],"apps":[10,43,66],"for":[11,144,199,280,298],"android":[12,148,250],"are":[14,22,142,190,263],"being":[15],"introduced":[16],"frequently":[17],"in":[18,128,205,218,256,265],"market":[20],"which":[21,79,252],"currently":[23],"available":[24],"on":[25,192,248,276],"Play":[27],"Store,":[28],"APK":[29,31,35],"Pure,":[30],"Mirror,":[32],"and":[33,50,67,89,120,138,150,174,181,213,217,231,259],"other":[34],"stores.":[36],"Consequently,":[37],"it":[38,233],"is":[39,108,115,124],"difficult":[40],"to":[41,130,152,227],"find":[42],"that":[44,55,63,77,98,189,246,262],"don't":[45],"harm":[46],"users'":[47],"privacy,":[48],"integrity,":[49],"intellectual":[51],"property":[52],"rights.":[53],"For":[54,178],"reason,":[56],"we":[57,94,183,209,221,271],"made":[58],"a":[59,96],"framework":[60,97,161,247],"named":[61],"ANTI-ANT":[62],"detects":[64],"malware":[65,78,156,188,204,230,237],"prevents":[68],"them":[69,154],"from":[70],"harming":[71],"phone.":[73],"We":[74,201,244],"mainly":[75],"target":[76],"comprises":[80],"of":[81,100,103,134,147,163,166,187,195,290,296],"Botnets,":[82],"Rootkits,":[83],"SMS":[84],"malware,":[85,149],"Spywares,":[86],"app":[87],"installers,":[88],"ransomware.":[90],"In":[91],"this":[92],"paper,":[93],"proposed":[95],"consists":[99,162],"three":[101],"layers":[102],"detection.":[104],"The":[105,160],"first":[106],"layer":[107,114],"application":[110],"layer,":[111,119,127],"second":[113],"user":[117],"background":[118,258],"last":[122],"one":[123],"package":[126],"order":[129],"distinguish":[131],"malicious":[132],"behaviors":[133],"malware.":[135],"Both":[136],"static":[137],"dynamic":[139],"detection":[140],"analyses":[141],"used":[143,184,264],"feature":[145],"extraction":[146],"then":[151,214],"classify":[153],"as":[155],"or":[157],"benign":[158],"applications.":[159],"participation":[165],"multi-classifiers":[167],"Logistic":[168,299],"Regressor,":[169],"Decision":[170],"Tree,":[171],"Random":[172],"Forest,":[173],"Support":[175],"Vector":[176],"Machine.":[177],"training":[180],"testing,":[182],"13,559":[185],"samples":[186],"analyzed":[191],"datasets":[194,279],"CCCS-CIC-AndMal-2020":[196],"(Canadian":[197],"Institute":[198],"Cybersecurity).":[200],"detect":[202,228],"four":[206],"phases.":[207],"First,":[208],"analyze":[210],"features":[212],"perform":[215],"assessments,":[216],"Phase":[219],"four,":[220],"train":[222],"Machine":[224],"Learning":[225],"models":[226],"prevent":[232],"using":[235],"block":[238],"applist":[239],"generated":[240],"our":[242,281],"model.":[243],"run":[245],"500":[249],"phones":[251],"checks":[253],"their":[254,266],"behavior":[255],"permissions":[261],"manifest":[267],"file.":[268],"After":[269],"training,":[270],"got":[272],"results":[274],"based":[275],"labeled":[278],"ML":[282],"Models,":[283],"SVM":[285],"achieved":[286],"highest":[288],"accuracy":[289,295],"96.64%,":[291],"along":[292],"with":[293],"91.50%":[297],"Regressor.":[300]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
