{"id":"https://openalex.org/W4404030397","doi":"https://doi.org/10.1109/icccnt61001.2024.10724764","title":"Malware Classification for Enhanced Android Permissions: A Comparative Study of SVM Kernel and Voting Classifier","display_name":"Malware Classification for Enhanced Android Permissions: A Comparative Study of SVM Kernel and Voting Classifier","publication_year":2024,"publication_date":"2024-06-24","ids":{"openalex":"https://openalex.org/W4404030397","doi":"https://doi.org/10.1109/icccnt61001.2024.10724764"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt61001.2024.10724764","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt61001.2024.10724764","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088135092","display_name":"Preet Singh","orcid":"https://orcid.org/0009-0009-2500-1361"},"institutions":[{"id":"https://openalex.org/I74319210","display_name":"Chitkara University","ror":"https://ror.org/057d6z539","country_code":"IN","type":"education","lineage":["https://openalex.org/I74319210"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Preet Singh","raw_affiliation_strings":["Chitkara University Institute of Engineering and Technology Chitkara University,Punjab,India"],"affiliations":[{"raw_affiliation_string":"Chitkara University Institute of Engineering and Technology Chitkara University,Punjab,India","institution_ids":["https://openalex.org/I74319210"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084458056","display_name":"Taniya Hasija","orcid":"https://orcid.org/0000-0002-3891-3732"},"institutions":[{"id":"https://openalex.org/I74319210","display_name":"Chitkara University","ror":"https://ror.org/057d6z539","country_code":"IN","type":"education","lineage":["https://openalex.org/I74319210"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Taniya Hasija","raw_affiliation_strings":["Chitkara University Institute of Engineering and Technology Chitkara University,Punjab,India"],"affiliations":[{"raw_affiliation_string":"Chitkara University Institute of Engineering and Technology Chitkara University,Punjab,India","institution_ids":["https://openalex.org/I74319210"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5104341140","display_name":"Kr Ramkumar","orcid":null},"institutions":[{"id":"https://openalex.org/I74319210","display_name":"Chitkara University","ror":"https://ror.org/057d6z539","country_code":"IN","type":"education","lineage":["https://openalex.org/I74319210"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Kr Ramkumar","raw_affiliation_strings":["Chitkara University Institute of Engineering and Technology Chitkara University,Punjab,India"],"affiliations":[{"raw_affiliation_string":"Chitkara University Institute of Engineering and Technology Chitkara University,Punjab,India","institution_ids":["https://openalex.org/I74319210"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5088135092"],"corresponding_institution_ids":["https://openalex.org/I74319210"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.22041975,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.986299991607666,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7733051776885986},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7277493476867676},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6768944263458252},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.5845329165458679},{"id":"https://openalex.org/keywords/voting","display_name":"Voting","score":0.5088074803352356},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4994165897369385},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.4743156135082245},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.47304433584213257},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4419122040271759},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.39751899242401123},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35040879249572754},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.33580631017684937}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7733051776885986},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7277493476867676},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6768944263458252},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.5845329165458679},{"id":"https://openalex.org/C520049643","wikidata":"https://www.wikidata.org/wiki/Q189760","display_name":"Voting","level":3,"score":0.5088074803352356},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4994165897369385},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.4743156135082245},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.47304433584213257},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4419122040271759},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.39751899242401123},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35040879249572754},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.33580631017684937},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt61001.2024.10724764","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt61001.2024.10724764","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W90790289","https://openalex.org/W1508584952","https://openalex.org/W1963849366","https://openalex.org/W1975146652","https://openalex.org/W1997931601","https://openalex.org/W2144112223","https://openalex.org/W2568897335","https://openalex.org/W2587930273","https://openalex.org/W2601005640","https://openalex.org/W2910657275","https://openalex.org/W2996806689","https://openalex.org/W3014600074","https://openalex.org/W3093469966","https://openalex.org/W4205875715","https://openalex.org/W4313427720","https://openalex.org/W4366492118","https://openalex.org/W4377969617","https://openalex.org/W4381548520","https://openalex.org/W4392745607"],"related_works":["https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W2591124010","https://openalex.org/W3200508744","https://openalex.org/W3025122950","https://openalex.org/W2311926078","https://openalex.org/W2895504842","https://openalex.org/W4281384336","https://openalex.org/W2717179875","https://openalex.org/W4249118297"],"abstract_inverted_index":{"Malicious":[0],"software,":[1],"or":[2,98],"malware,":[3],"is":[4,20,65],"programming":[5],"code":[6],"to":[7,35,44,75,81,146],"infiltrate":[8],"computer":[9],"systems":[10],"through":[11],"security":[12],"holes.":[13],"Besides,":[14],"for":[15,117],"an":[16,91],"organized":[17],"company,":[18],"there":[19],"a":[21,46,103,132,138],"threat":[22],"that":[23,71],"can":[24,40,72],"be":[25,42,73,144],"dangerous":[26],"if":[27],"attacked":[28],"by":[29,90],"this":[30],"malware":[31,39,61,119],"because,":[32],"in":[33,55,93,122],"addition":[34],"data":[36],"theft,":[37],"the":[38,53,56,68,87,94,107,118,123,127],"also":[41],"used":[43,74],"launch":[45],"Distributed":[47],"Denial":[48],"of":[49,60,67,106,126,134],"Service":[50],"(DDOS).":[51],"With":[52],"increase":[54],"quantity":[57],"and":[58,110],"variety":[59],"present,":[62],"machine":[63],"learning":[64],"one":[66],"essential":[69],"techniques":[70],"detect":[76],"malware.":[77],"This":[78],"research":[79],"aims":[80],"perform":[82],"classification,":[83],"specifically":[84],"detecting":[85],"whether":[86],"permissions":[88],"accessed":[89],"application":[92],"device":[95],"are":[96],"Benign":[97],"Suspicious.":[99],"The":[100],"study":[101],"draws":[102],"comparative":[104],"analysis":[105],"algorithms":[108],"SVM":[109],"Voting":[111],"Classifier":[112],"(VC)":[113],"Ensemble":[114,129],"Approach":[115],"implemented":[116],"categorization":[120],"results":[121],"high":[124],"performance":[125],"VC":[128],"Technique":[130],"with":[131],"value":[133],"98.5%.":[135],"To":[136],"create":[137],"sustainable":[139],"digital":[140],"environment,":[141],"precautions":[142],"must":[143],"taken":[145],"protect":[147],"against":[148],"infected":[149],"software.":[150]},"counts_by_year":[],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
