{"id":"https://openalex.org/W2288383743","doi":"https://doi.org/10.1109/iscc.2015.7405598","title":"Fest: A feature extraction and selection tool for Android malware detection","display_name":"Fest: A feature extraction and selection tool for Android malware detection","publication_year":2015,"publication_date":"2015-07-01","ids":{"openalex":"https://openalex.org/W2288383743","doi":"https://doi.org/10.1109/iscc.2015.7405598","mag":"2288383743"},"language":"en","primary_location":{"id":"doi:10.1109/iscc.2015.7405598","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc.2015.7405598","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE Symposium on Computers and Communication (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078276127","display_name":"Kai Zhao","orcid":"https://orcid.org/0000-0002-2496-0829"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kai Zhao","raw_affiliation_strings":["College of Computer Science and Electronics Engineering, Hunan University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronics Engineering, Hunan University, Changsha, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101594820","display_name":"Dafang Zhang","orcid":"https://orcid.org/0000-0003-0765-6857"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dafang Zhang","raw_affiliation_strings":["College of Computer Science and Electronics Engineering, Hunan University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronics Engineering, Hunan University, Changsha, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100640053","display_name":"Xin Su","orcid":"https://orcid.org/0000-0002-1860-9004"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Su","raw_affiliation_strings":["College of Computer Science and Electronics Engineering, Hunan University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronics Engineering, Hunan University, Changsha, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100660669","display_name":"Wenjia Li","orcid":"https://orcid.org/0000-0001-6059-6422"},"institutions":[{"id":"https://openalex.org/I4210104314","display_name":"New York Institute of Technology","ror":"https://ror.org/01bghzb51","country_code":"US","type":"education","lineage":["https://openalex.org/I4210104314"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wenjia Li","raw_affiliation_strings":["Department of Computer Sciences, New York Institute of Technology, New York, NY, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Sciences, New York Institute of Technology, New York, NY, USA","institution_ids":["https://openalex.org/I4210104314"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5078276127"],"corresponding_institution_ids":["https://openalex.org/I16609230"],"apc_list":null,"apc_paid":null,"fwci":2.5847,"has_fulltext":false,"cited_by_count":73,"citation_normalized_percentile":{"value":0.90718284,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"714","last_page":"720"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9854999780654907,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.905686616897583},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8233298063278198},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.8156662583351135},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8139115571975708},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.8029074668884277},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.6881000995635986},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5963863134384155},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5789915323257446},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3582087755203247},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20658481121063232},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1873272955417633}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.905686616897583},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8233298063278198},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.8156662583351135},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8139115571975708},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.8029074668884277},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.6881000995635986},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5963863134384155},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5789915323257446},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3582087755203247},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20658481121063232},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1873272955417633}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc.2015.7405598","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc.2015.7405598","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE Symposium on Computers and Communication (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W81879861","https://openalex.org/W124941384","https://openalex.org/W1943233084","https://openalex.org/W2007857904","https://openalex.org/W2114275288","https://openalex.org/W2122672392","https://openalex.org/W2125011234","https://openalex.org/W2126242334","https://openalex.org/W2153542583","https://openalex.org/W2164539435","https://openalex.org/W2166743230","https://openalex.org/W2398484989","https://openalex.org/W2544992706","https://openalex.org/W3136699861","https://openalex.org/W4244726870","https://openalex.org/W6603356336","https://openalex.org/W6682754051","https://openalex.org/W6712745783"],"related_works":["https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W2591124010","https://openalex.org/W3200508744","https://openalex.org/W3025122950","https://openalex.org/W2311926078","https://openalex.org/W2895504842","https://openalex.org/W4281384336","https://openalex.org/W2717179875","https://openalex.org/W4249118297"],"abstract_inverted_index":{"Android":[0,19,47,221],"has":[1,64],"become":[2],"one":[3],"of":[4,12,30,35,38,62],"the":[5,36,115,142,184],"most":[6,29],"popular":[7],"mobile":[8],"operating":[9],"systems":[10],"because":[11,34,151],"numerous":[13],"applications":[14],"(apps)":[15],"it":[16],"provides.":[17],"However,":[18],"malware":[20,48,92,147,158,170,218],"downloaded":[21],"from":[22,171],"third-party":[23],"markets":[24],"threatens":[25],"users'":[26],"privacy,":[27],"and":[28,40,60,82,148,159,183,193],"them":[31,63],"remain":[32],"undetected":[33],"lack":[37],"efficient":[39],"accurate":[41],"detecting":[42],"techniques.":[43],"Prior":[44],"efforts":[45],"on":[46,209],"detection":[49,219],"attempted":[50],"to":[51,70,105,114,168,205],"build":[52],"precise":[53],"classification":[54],"models":[55],"by":[56,133,140],"manually":[57],"choosing":[58],"features,":[59,107],"few":[61],"used":[65,156,161],"any":[66],"feature":[67,98,122],"selection":[68,123,128],"algorithms":[69,129],"help":[71],"pick":[72,131],"typical":[73],"features.":[74],"In":[75,174],"this":[76],"paper,":[77],"we":[78,119,176],"present":[79],"Feature":[80],"Extraction":[81],"Selection":[83],"Tool":[84],"(Fest),":[85],"a":[86,97,121,210],"feature-based":[87],"machine":[88],"learning":[89],"approach":[90,179],"for":[91,217],"detection.":[93],"We":[94],"first":[95],"implement":[96],"extraction":[99],"tool,":[100],"AppExtractor,":[101],"which":[102,130,153,213],"is":[103,214],"designed":[104],"extract":[106],"such":[108],"as":[109],"permissions":[110],"or":[111],"APIs,":[112],"according":[113],"predefined":[116],"rules.":[117],"Then":[118],"propose":[120],"algorithm,":[124],"FrequenSel.":[125],"Unlike":[126],"existing":[127],"features":[132,139,152],"calculating":[134],"their":[135,144],"importance,":[136],"FrequenSel":[137],"selects":[138],"finding":[141],"difference":[143],"frequencies":[145],"between":[146],"benign":[149,163,172],"apps,":[150,182],"are":[154,165],"frequently":[155],"in":[157,162,220],"rarely":[160],"apps":[164],"more":[166],"important":[167],"distinguish":[169],"apps.":[173],"experiments,":[175],"evaluate":[177],"our":[178],"with":[180,195],"7972":[181],"results":[185],"show":[186],"that":[187],"Fest":[188,201],"gets":[189],"nearly":[190],"98%":[191],"accuracy":[192],"recall,":[194],"only":[196,202],"2%":[197],"false":[198],"alarms.":[199],"Moreover,":[200],"takes":[203],"6.5s":[204],"analyze":[206],"an":[207],"app":[208],"common":[211],"PC,":[212],"very":[215],"time-efficient":[216],"markets.":[222]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":15},{"year":2021,"cited_by_count":13},{"year":2020,"cited_by_count":11},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
