{"id":"https://openalex.org/W4293532105","doi":"https://doi.org/10.1142/s0219467823500523","title":"Visualizing Android Malicious Applications Using Texture Features","display_name":"Visualizing Android Malicious Applications Using Texture Features","publication_year":2022,"publication_date":"2022-08-29","ids":{"openalex":"https://openalex.org/W4293532105","doi":"https://doi.org/10.1142/s0219467823500523"},"language":"en","primary_location":{"id":"doi:10.1142/s0219467823500523","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219467823500523","pdf_url":null,"source":{"id":"https://openalex.org/S60080701","display_name":"International Journal of Image and Graphics","issn_l":"0219-4678","issn":["0219-4678","1793-6756"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Image and Graphics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004111599","display_name":"Tejpal Sharma","orcid":"https://orcid.org/0000-0003-1896-1734"},"institutions":[{"id":"https://openalex.org/I79161377","display_name":"Punjabi University","ror":"https://ror.org/00xdn8y92","country_code":"IN","type":"education","lineage":["https://openalex.org/I79161377"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Tejpal Sharma","raw_affiliation_strings":["Department of Computer Science and Engineering, CGC-College of Engineering, Landran, Mohali 140307, Punjab, India","Department of Computer Science and Engineering, Punjabi University, Patiala 147002, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, CGC-College of Engineering, Landran, Mohali 140307, Punjab, India","institution_ids":[]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Punjabi University, Patiala 147002, Punjab, India","institution_ids":["https://openalex.org/I79161377"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025227458","display_name":"Dhavleesh Rattan","orcid":"https://orcid.org/0000-0002-6295-5078"},"institutions":[{"id":"https://openalex.org/I79161377","display_name":"Punjabi University","ror":"https://ror.org/00xdn8y92","country_code":"IN","type":"education","lineage":["https://openalex.org/I79161377"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dhavleesh Rattan","raw_affiliation_strings":["Department of Computer Science and Engineering, Punjabi University, Patiala 147002, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Punjabi University, Patiala 147002, Punjab, India","institution_ids":["https://openalex.org/I79161377"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5004111599"],"corresponding_institution_ids":["https://openalex.org/I79161377"],"apc_list":null,"apc_paid":null,"fwci":0.5949,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.64132816,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"23","issue":"06","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.97079998254776,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9670000076293945,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8491283059120178},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7283531427383423},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.5850708484649658},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.5077925324440002},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.5000913143157959},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4751838743686676},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.46648433804512024},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4499911367893219},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.43475914001464844},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.41275182366371155},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36945128440856934},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2432047724723816},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12218108773231506},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12184339761734009}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8491283059120178},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7283531427383423},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.5850708484649658},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.5077925324440002},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.5000913143157959},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4751838743686676},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.46648433804512024},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4499911367893219},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.43475914001464844},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41275182366371155},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36945128440856934},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2432047724723816},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12218108773231506},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12184339761734009}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0219467823500523","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219467823500523","pdf_url":null,"source":{"id":"https://openalex.org/S60080701","display_name":"International Journal of Image and Graphics","issn_l":"0219-4678","issn":["0219-4678","1793-6756"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Image and Graphics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1153484263","https://openalex.org/W2010065958","https://openalex.org/W2012132268","https://openalex.org/W2029653641","https://openalex.org/W2046073053","https://openalex.org/W2047167450","https://openalex.org/W2104839588","https://openalex.org/W2132130037","https://openalex.org/W2143748127","https://openalex.org/W2170590026","https://openalex.org/W2172128594","https://openalex.org/W2407313496","https://openalex.org/W2546419805","https://openalex.org/W2575599800","https://openalex.org/W2598193574","https://openalex.org/W2612123163","https://openalex.org/W2755372917","https://openalex.org/W2770445302","https://openalex.org/W2788141255","https://openalex.org/W2887944710","https://openalex.org/W2907648650","https://openalex.org/W2911956266","https://openalex.org/W2936512185","https://openalex.org/W2944600692","https://openalex.org/W2972753993","https://openalex.org/W3005039930","https://openalex.org/W3094691072","https://openalex.org/W3115977323","https://openalex.org/W3129375586","https://openalex.org/W3172817683","https://openalex.org/W3194023013"],"related_works":["https://openalex.org/W2782775281","https://openalex.org/W4312334973","https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W4327939473","https://openalex.org/W2085301524","https://openalex.org/W2591124010","https://openalex.org/W4311848503","https://openalex.org/W2717179875","https://openalex.org/W4249118297"],"abstract_inverted_index":{"Context:":[0],"Due":[1],"to":[2,32,70,78,156],"the":[3,12,22,85,107,115,120,147,158,182,188,209],"change":[4],"and":[5,129,160,181],"advancement":[6],"in":[7,131],"technology,":[8],"day":[9,11],"by":[10],"internet":[13],"service":[14],"usages":[15],"are":[16,50,125,138,154,179],"also":[17],"increasing.":[18],"Smartphones":[19],"have":[20,193],"become":[21],"necessity":[23],"for":[24,60,91,114,198],"every":[25],"person":[26],"these":[27],"days.":[28],"It":[29],"is":[30,69,112,167,185],"used":[31,77,113,155],"perform":[33],"all":[34,92],"basic":[35],"daily":[36],"activities":[37],"such":[38],"as":[39],"calling,":[40],"SMS,":[41],"banking,":[42],"gaming,":[43],"entertainment,":[44],"education,":[45],"etc.":[46],"Therefore,":[47],"malware":[48],"authors":[49],"developing":[51],"new":[52],"variants":[53],"of":[54,65,94,117,136,201],"malwares":[55,80],"or":[56,81,96],"malicious":[57,82,98,159],"applications":[58,83],"especially":[59],"monetary":[61],"benefits.":[62],"Objective:":[63],"Objective":[64],"this":[66],"research":[67],"paper":[68],"develop":[71],"a":[72,195],"technique":[73,197,205],"that":[74,88],"can":[75],"be":[76],"detect":[79],"on":[84,169],"android":[86],"devices":[87],"will":[89],"work":[90],"types":[93],"packed":[95],"encrypted":[97],"applications,":[99],"which":[100],"usually":[101],"evade":[102],"decompiling":[103],"tools.":[104],"Method:":[105],"In":[106,119,146],"proposed":[108,165,183,194,204],"approach,":[109],"visualization":[110],"method":[111],"detection":[116,200],"malware.":[118],"first":[121],"phase,":[122,133,149],"application":[123],"files":[124],"converted":[126],"into":[127],"images":[128,137],"then":[130],"second":[132],"texture":[134],"feature":[135],"extracted":[139],"using":[140],"Grey":[141],"Level":[142],"Co-occurrence":[143],"Matrix":[144],"(GLCM).":[145],"last":[148],"machine":[150],"learning":[151],"classification":[152],"algorithms":[153],"classify":[157],"benign":[161],"applications.":[162],"Results:":[163],"The":[164,203],"approach":[166,184],"run":[168],"different":[170],"datasets":[171],"collected":[172],"from":[173],"various":[174],"repositories.":[175],"Different":[176],"efficiency":[177],"parameters":[178],"calculated":[180],"compared":[186],"with":[187],"existing":[189,210],"approaches.":[190],"Conclusion:":[191],"We":[192],"static":[196],"efficient":[199],"malwares.":[202],"performs":[206],"better":[207],"than":[208],"technique.":[211]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
