{"id":"https://openalex.org/W3114980949","doi":"https://doi.org/10.1145/3428363.3428375","title":"An Optimized Decision Tree based Android Malware Detection Approach using Machine Learning","display_name":"An Optimized Decision Tree based Android Malware Detection Approach using Machine Learning","publication_year":2020,"publication_date":"2020-12-22","ids":{"openalex":"https://openalex.org/W3114980949","doi":"https://doi.org/10.1145/3428363.3428375","mag":"3114980949"},"language":"en","primary_location":{"id":"doi:10.1145/3428363.3428375","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3428363.3428375","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"7th International Conference on Networking, Systems and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112388894","display_name":"Mosaddek Hossain","orcid":null},"institutions":[{"id":"https://openalex.org/I183697816","display_name":"Bangladesh University of Engineering and Technology","ror":"https://ror.org/05a1qpv97","country_code":"BD","type":"education","lineage":["https://openalex.org/I183697816"]}],"countries":["BD"],"is_corresponding":true,"raw_author_name":"Mosaddek Hossain","raw_affiliation_strings":["Bangladesh University of Engineering and Technology, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Bangladesh University of Engineering and Technology, Bangladesh","institution_ids":["https://openalex.org/I183697816"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057145981","display_name":"S. Rafi","orcid":"https://orcid.org/0000-0002-3244-5800"},"institutions":[{"id":"https://openalex.org/I183697816","display_name":"Bangladesh University of Engineering and Technology","ror":"https://ror.org/05a1qpv97","country_code":"BD","type":"education","lineage":["https://openalex.org/I183697816"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Suzzana Rafi","raw_affiliation_strings":["Bangladesh University of Engineering and Technology, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Bangladesh University of Engineering and Technology, Bangladesh","institution_ids":["https://openalex.org/I183697816"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069844849","display_name":"Md. Shohrab Hossain","orcid":"https://orcid.org/0000-0002-4612-6771"},"institutions":[{"id":"https://openalex.org/I183697816","display_name":"Bangladesh University of Engineering and Technology","ror":"https://ror.org/05a1qpv97","country_code":"BD","type":"education","lineage":["https://openalex.org/I183697816"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Shohrab Hossain","raw_affiliation_strings":["Bangladesh University of Engineering and Technology, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Bangladesh University of Engineering and Technology, Bangladesh","institution_ids":["https://openalex.org/I183697816"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5112388894"],"corresponding_institution_ids":["https://openalex.org/I183697816"],"apc_list":null,"apc_paid":null,"fwci":0.9092,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.7516129,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"115","last_page":"125"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9812999963760376,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/c4.5-algorithm","display_name":"C4.5 algorithm","score":0.887610137462616},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8300478458404541},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8030627965927124},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.7841119766235352},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.740101158618927},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7394871115684509},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.7231149077415466},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.7128865122795105},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6012812852859497},{"id":"https://openalex.org/keywords/information-gain-ratio","display_name":"Information gain ratio","score":0.4296424984931946},{"id":"https://openalex.org/keywords/random-tree","display_name":"Random tree","score":0.41976967453956604},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4134621322154999},{"id":"https://openalex.org/keywords/id3-algorithm","display_name":"ID3 algorithm","score":0.41185706853866577},{"id":"https://openalex.org/keywords/decision-tree-learning","display_name":"Decision tree learning","score":0.3429202437400818},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.32737234234809875},{"id":"https://openalex.org/keywords/incremental-decision-tree","display_name":"Incremental decision tree","score":0.17678552865982056},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.1482733190059662},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14804911613464355},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09873980283737183}],"concepts":[{"id":"https://openalex.org/C52003472","wikidata":"https://www.wikidata.org/wiki/Q1022655","display_name":"C4.5 algorithm","level":4,"score":0.887610137462616},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8300478458404541},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8030627965927124},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.7841119766235352},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.740101158618927},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7394871115684509},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.7231149077415466},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.7128865122795105},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6012812852859497},{"id":"https://openalex.org/C202185110","wikidata":"https://www.wikidata.org/wiki/Q6031086","display_name":"Information gain ratio","level":3,"score":0.4296424984931946},{"id":"https://openalex.org/C2776839635","wikidata":"https://www.wikidata.org/wiki/Q14942679","display_name":"Random tree","level":4,"score":0.41976967453956604},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4134621322154999},{"id":"https://openalex.org/C183931066","wikidata":"https://www.wikidata.org/wiki/Q1653378","display_name":"ID3 algorithm","level":5,"score":0.41185706853866577},{"id":"https://openalex.org/C5481197","wikidata":"https://www.wikidata.org/wiki/Q16766476","display_name":"Decision tree learning","level":3,"score":0.3429202437400818},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.32737234234809875},{"id":"https://openalex.org/C10229987","wikidata":"https://www.wikidata.org/wiki/Q17083028","display_name":"Incremental decision tree","level":4,"score":0.17678552865982056},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.1482733190059662},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14804911613464355},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09873980283737183},{"id":"https://openalex.org/C81074085","wikidata":"https://www.wikidata.org/wiki/Q366872","display_name":"Motion planning","level":3,"score":0.0},{"id":"https://openalex.org/C90509273","wikidata":"https://www.wikidata.org/wiki/Q11012","display_name":"Robot","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3428363.3428375","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3428363.3428375","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"7th International Conference on Networking, Systems and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/15","score":0.4399999976158142,"display_name":"Life in Land"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W38301456","https://openalex.org/W2007857904","https://openalex.org/W2149706766","https://openalex.org/W2466023328","https://openalex.org/W2485784239","https://openalex.org/W2591102410","https://openalex.org/W2773683702","https://openalex.org/W2792310543","https://openalex.org/W2903488155","https://openalex.org/W2911964244","https://openalex.org/W2916526882","https://openalex.org/W2980750320","https://openalex.org/W3010938198","https://openalex.org/W3012227398","https://openalex.org/W6601578796"],"related_works":["https://openalex.org/W2187715916","https://openalex.org/W4285406884","https://openalex.org/W2373399597","https://openalex.org/W3127626731","https://openalex.org/W2756012949","https://openalex.org/W2132193332","https://openalex.org/W2414055245","https://openalex.org/W3003508951","https://openalex.org/W3003720309","https://openalex.org/W3114980949"],"abstract_inverted_index":{"The":[0],"growing":[1],"trend":[2],"of":[3,165],"attacking":[4],"Android":[5,45],"smart":[6],"phones":[7],"using":[8,93,100,139,147],"malicious":[9,178],"app":[10],"has":[11],"started":[12],"posing":[13],"significant":[14,69],"threats":[15],"for":[16,24],"the":[17,26,67,127],"users.":[18],"Many":[19],"approaches":[20],"have":[21,84,110,135,153],"been":[22],"introduced":[23],"protecting":[25],"users":[27,176],"against":[28],"such":[29],"malware.":[30],"However,":[31],"those":[32],"solutions":[33],"tend":[34],"to":[35,39,65,89,125,162],"use":[36],"many":[37],"features":[38,70,96],"get":[40],"better":[41,78],"accuracy":[42,146],"in":[43,50,53,72,183],"detecting":[44],"malware":[46,131],"which":[47,115],"eventually":[48],"results":[49,138],"higher":[51,145],"complexity":[52],"creating":[54],"machine":[55,112],"learning":[56,113],"based":[57],"models.":[58],"Hence,":[59],"an":[60],"effective":[61],"model":[62,75],"is":[63],"required":[64],"find":[66],"most":[68],"resulting":[71],"a":[73,86,184],"faster":[74,137,185],"yet":[76,186],"having":[77],"accuracy.":[79],"In":[80],"this":[81],"paper,":[82],"we":[83,152],"proposed":[85,171],"robust":[87],"approach":[88],"detect":[90],"android":[91],"malwares":[92],"only":[94],"selective":[95],"that":[97],"are":[98],"extracted":[99],"Ranker":[101],"search":[102],"method":[103,173],"and":[104,122,132,143,155,167],"Gain":[105],"Ratio":[106],"attribute":[107],"evaluator.":[108],"We":[109,134],"used":[111],"algorithms":[114],"include":[116],"J48":[117],"Decision":[118],"Tree,":[119],"Random":[120,123,140,148],"Forest":[121,149],"Tree":[124,141],"classify":[126],"preprocessed":[128],"dataset":[129],"into":[130],"benign.":[133],"produced":[136],"algorithm":[142],"obtained":[144],"algorithm.":[150],"Further,":[151],"measured":[154],"compared":[156],"various":[157],"performance":[158],"metrics":[159],"with":[160],"respect":[161],"different":[163,168],"numbers":[164],"attributes":[166],"classifiers.":[169],"Our":[170],"detection":[172],"can":[174],"help":[175],"distinguish":[177],"applications":[179],"from":[180],"benign":[181],"ones":[182],"precise":[187],"manner.":[188]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
