{"id":"https://openalex.org/W3006140383","doi":"https://doi.org/10.1109/menacomm46666.2019.8988532","title":"Benchmarking Open-Source Android Malware Detection Tools","display_name":"Benchmarking Open-Source Android Malware Detection Tools","publication_year":2019,"publication_date":"2019-11-01","ids":{"openalex":"https://openalex.org/W3006140383","doi":"https://doi.org/10.1109/menacomm46666.2019.8988532","mag":"3006140383"},"language":"en","primary_location":{"id":"doi:10.1109/menacomm46666.2019.8988532","is_oa":false,"landing_page_url":"https://doi.org/10.1109/menacomm46666.2019.8988532","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 2nd IEEE Middle East and North Africa COMMunications Conference (MENACOMM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034925536","display_name":"Mohammed Samara","orcid":null},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Mohammed Samara","raw_affiliation_strings":["King Fahd University of Petroleum &#x0026; Minerals (KFUPM),Information &#x0026; Computer Science Dept.,Dhahran,Saudi Arabia","Information & Computer Science Dept., King Fahd University of Petroleum & Minerals (KFUPM), Dhahran, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"King Fahd University of Petroleum &#x0026; Minerals (KFUPM),Information &#x0026; Computer Science Dept.,Dhahran,Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]},{"raw_affiliation_string":"Information & Computer Science Dept., King Fahd University of Petroleum & Minerals (KFUPM), Dhahran, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057893924","display_name":"El-Sayed M. El-Alfy","orcid":"https://orcid.org/0000-0001-6279-9776"},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"El-Sayed M. El-Alfy","raw_affiliation_strings":["King Fahd University of Petroleum &#x0026; Minerals (KFUPM),Information &#x0026; Computer Science Dept.,Dhahran,Saudi Arabia","Information & Computer Science Dept., King Fahd University of Petroleum & Minerals (KFUPM), Dhahran, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"King Fahd University of Petroleum &#x0026; Minerals (KFUPM),Information &#x0026; Computer Science Dept.,Dhahran,Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]},{"raw_affiliation_string":"Information & Computer Science Dept., King Fahd University of Petroleum & Minerals (KFUPM), Dhahran, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5034925536"],"corresponding_institution_ids":["https://openalex.org/I134085113"],"apc_list":null,"apc_paid":null,"fwci":0.6634,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.70553578,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9847000241279602,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9077017307281494},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8528600931167603},{"id":"https://openalex.org/keywords/benchmarking","display_name":"Benchmarking","score":0.8438869118690491},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.79698246717453},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7852651476860046},{"id":"https://openalex.org/keywords/open-source","display_name":"Open source","score":0.5662323832511902},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.4797435998916626},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.33328068256378174},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.14826884865760803}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9077017307281494},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8528600931167603},{"id":"https://openalex.org/C86251818","wikidata":"https://www.wikidata.org/wiki/Q816754","display_name":"Benchmarking","level":2,"score":0.8438869118690491},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.79698246717453},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7852651476860046},{"id":"https://openalex.org/C3018397939","wikidata":"https://www.wikidata.org/wiki/Q3644502","display_name":"Open source","level":3,"score":0.5662323832511902},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.4797435998916626},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.33328068256378174},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.14826884865760803},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/menacomm46666.2019.8988532","is_oa":false,"landing_page_url":"https://doi.org/10.1109/menacomm46666.2019.8988532","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 2nd IEEE Middle East and North Africa COMMunications Conference (MENACOMM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2018316318","https://openalex.org/W2048715902","https://openalex.org/W2308726246","https://openalex.org/W2407059953","https://openalex.org/W2529696250","https://openalex.org/W2551095084","https://openalex.org/W2563758005","https://openalex.org/W2588646573","https://openalex.org/W2600659481","https://openalex.org/W2742429299","https://openalex.org/W2752485287","https://openalex.org/W2765271136","https://openalex.org/W2782729947","https://openalex.org/W2789983203","https://openalex.org/W2809058871","https://openalex.org/W2891723189","https://openalex.org/W2900275727","https://openalex.org/W2906631928","https://openalex.org/W2964136807","https://openalex.org/W3099168646","https://openalex.org/W6743526133"],"related_works":["https://openalex.org/W2782775281","https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W2591124010","https://openalex.org/W3200508744","https://openalex.org/W3025122950","https://openalex.org/W2311926078","https://openalex.org/W2895504842","https://openalex.org/W2717179875","https://openalex.org/W4249118297"],"abstract_inverted_index":{"As":[0],"Android":[1,13,54,129],"is":[2,15,63],"becoming":[3],"more":[4,6,27],"and":[5,25,33,48,52,70,101,123,132],"prevalent":[7],"in":[8],"modern":[9],"devices,":[10],"malware":[11,21,109,130],"targeting":[12],"systems":[14],"significantly":[16],"increasing.":[17],"New":[18],"generation":[19],"of":[20,58,60,83,93,128],"has":[22,119],"great":[23],"diversity":[24],"uses":[26],"sophisticated":[28],"techniques":[29,47],"to":[30],"hide":[31],"traces":[32],"fool":[34],"traditional":[35],"detection":[36,110],"methods.":[37],"On":[38],"the":[39,72,91],"other":[40],"hand,":[41],"many":[42],"researchers":[43],"have":[44],"proposed":[45],"various":[46],"tools":[49,62],"for":[50],"detecting":[51],"classifying":[53],"malware.":[55,84],"The":[56,117],"evaluation":[57],"most":[59],"these":[61],"based":[64],"on":[65],"closed":[66],"or":[67,81],"obsolete":[68],"datasets,":[69],"likely":[71],"reported":[73],"performance":[74,92,104],"metrics":[75],"are":[76],"biased":[77],"towards":[78],"specific":[79],"features":[80],"categories":[82,131],"In":[85],"this":[86],"paper,":[87],"we":[88],"intensively":[89],"evaluate":[90],"an":[94],"existing":[95],"open-source":[96],"tool,":[97],"known":[98],"as":[99],"Dr-Droid,":[100],"benchmark":[102],"its":[103],"against":[105],"several":[106],"online":[107],"standard":[108],"engines":[111],"freely":[112],"accessible":[113],"through":[114],"VirusTotal":[115],"website.":[116],"dataset":[118],"been":[120],"recently":[121],"revealed":[122],"covers":[124],"a":[125],"large":[126],"number":[127],"families.":[133]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
