{"id":"https://openalex.org/W4285813987","doi":"https://doi.org/10.1109/iwcmc55113.2022.9824225","title":"Evaluating Dynamic Analysis Features for Android Malware Categorization","display_name":"Evaluating Dynamic Analysis Features for Android Malware Categorization","publication_year":2022,"publication_date":"2022-05-30","ids":{"openalex":"https://openalex.org/W4285813987","doi":"https://doi.org/10.1109/iwcmc55113.2022.9824225"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc55113.2022.9824225","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc55113.2022.9824225","pdf_url":null,"source":{"id":"https://openalex.org/S4363605313","display_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000773295","display_name":"Saneeha Khalid","orcid":null},"institutions":[{"id":"https://openalex.org/I59225215","display_name":"Bahria University","ror":"https://ror.org/02v8d7770","country_code":"PK","type":"education","lineage":["https://openalex.org/I59225215"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Saneeha Khalid","raw_affiliation_strings":["Bahria University,Computer Science Department,Islamabad,Pakistan","Computer Science Department, Bahria University, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Bahria University,Computer Science Department,Islamabad,Pakistan","institution_ids":["https://openalex.org/I59225215"]},{"raw_affiliation_string":"Computer Science Department, Bahria University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I59225215"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026922943","display_name":"Faisal Hussain","orcid":"https://orcid.org/0000-0001-9812-7488"},"institutions":[{"id":"https://openalex.org/I59225215","display_name":"Bahria University","ror":"https://ror.org/02v8d7770","country_code":"PK","type":"education","lineage":["https://openalex.org/I59225215"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Faisal Bashir Hussain","raw_affiliation_strings":["Bahria University,Computer Science Department,Islamabad,Pakistan","Computer Science Department, Bahria University, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Bahria University,Computer Science Department,Islamabad,Pakistan","institution_ids":["https://openalex.org/I59225215"]},{"raw_affiliation_string":"Computer Science Department, Bahria University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I59225215"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5000773295"],"corresponding_institution_ids":["https://openalex.org/I59225215"],"apc_list":null,"apc_paid":null,"fwci":1.4728,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.84739336,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.836737871170044},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8266203999519348},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7302327752113342},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.6554641723632812},{"id":"https://openalex.org/keywords/categorization","display_name":"Categorization","score":0.5893053412437439},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.5520107746124268},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.5514644980430603},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.44010287523269653},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3566341996192932},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3427968919277191},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3415762782096863},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16970762610435486}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.836737871170044},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8266203999519348},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7302327752113342},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.6554641723632812},{"id":"https://openalex.org/C94124525","wikidata":"https://www.wikidata.org/wiki/Q912550","display_name":"Categorization","level":2,"score":0.5893053412437439},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.5520107746124268},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.5514644980430603},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.44010287523269653},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3566341996192932},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3427968919277191},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3415762782096863},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16970762610435486},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc55113.2022.9824225","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc55113.2022.9824225","pdf_url":null,"source":{"id":"https://openalex.org/S4363605313","display_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2080157505","https://openalex.org/W2807671950","https://openalex.org/W2941199301","https://openalex.org/W2962880130","https://openalex.org/W2966634653","https://openalex.org/W2999422148","https://openalex.org/W3107835297","https://openalex.org/W3112311055","https://openalex.org/W3125391339","https://openalex.org/W3129623658","https://openalex.org/W3147879240","https://openalex.org/W3167683049","https://openalex.org/W3177627266","https://openalex.org/W3182600083","https://openalex.org/W3186079023","https://openalex.org/W3187102702","https://openalex.org/W3215132138","https://openalex.org/W6798460654"],"related_works":["https://openalex.org/W4285507391","https://openalex.org/W2610659201","https://openalex.org/W77168003","https://openalex.org/W2900526031","https://openalex.org/W3136388389","https://openalex.org/W3107556205","https://openalex.org/W4387947354","https://openalex.org/W65788704","https://openalex.org/W2183925834","https://openalex.org/W3200508744"],"abstract_inverted_index":{"Tremendous":[0],"increase":[1],"and":[2,87,133,144,156],"sophistication":[3],"in":[4,74,117,159],"Android":[5,69,96,136],"applications":[6],"is":[7,46,59,139],"making":[8],"malware":[9,23,97,111,137],"detection":[10,138],"a":[11,60,122],"challenging":[12],"task.":[13],"The":[14,71,147],"use":[15],"of":[16,22,42,64,67,95,104,107,128,151],"obfuscation":[17,33,50],"has":[18,113],"complicated":[19],"the":[20,102,126],"task":[21],"detection,":[24],"as":[25,44],"static":[26],"analysis":[27,41,124,131],"can":[28],"be":[29],"deceived":[30],"by":[31,54],"different":[32,142],"schemes.":[34],"Recently,":[35],"studies":[36,90],"have":[37,91],"focused":[38,92],"on":[39,93,125,135],"dynamic":[40,72,99,108,130,152],"applications,":[43],"it":[45],"more":[47],"resilient":[48],"against":[49],"techniques.":[51],"CCCS-CIC-AndMal-2020;":[52],"published":[53],"Canadian":[55],"institute":[56],"for":[57,110],"cybersecurity":[58],"recent":[61],"data":[62,76],"set":[63,77],"extracted":[65],"features":[66,73,109,134,153,158],"malicious":[68],"applications.":[70],"this":[75,120],"belong":[78],"to":[79],"six":[80],"categories:":[81],"memory,":[82],"network,":[83],"battery,":[84],"logs,":[85],"process":[86],"APIs.":[88],"Previous":[89],"classification":[94],"using":[98,141],"features.":[100],"However,":[101],"impact":[103,127],"individual":[105],"categories":[106,132,150,161],"categorization":[112],"not":[114],"been":[115],"analyzed":[116],"length.":[118],"In":[119],"study,":[121],"comprehensive":[123],"all":[129],"conducted":[140],"filter":[143],"wrapper":[145],"methods.":[146],"most":[148],"significant":[149],"are":[154,162],"reported":[155],"important":[157],"those":[160],"also":[163],"listed.":[164]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
