{"id":"https://openalex.org/W2892361554","doi":"https://doi.org/10.1155/2018/4672072","title":"Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications","display_name":"Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications","publication_year":2018,"publication_date":"2018-09-05","ids":{"openalex":"https://openalex.org/W2892361554","doi":"https://doi.org/10.1155/2018/4672072","mag":"2892361554"},"language":"en","primary_location":{"id":"doi:10.1155/2018/4672072","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2018/4672072","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"http://doi.org/10.1155/2018/4672072","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061855439","display_name":"Marios Argyriou","orcid":"https://orcid.org/0000-0001-7615-2957"},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Marios Argyriou","raw_affiliation_strings":["DTU Compute, Technical University of Denmark, Denmark"],"affiliations":[{"raw_affiliation_string":"DTU Compute, Technical University of Denmark, Denmark","institution_ids":["https://openalex.org/I96673099"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006444565","display_name":"Nicola Dragoni","orcid":"https://orcid.org/0000-0001-9575-2990"},"institutions":[{"id":"https://openalex.org/I26437253","display_name":"\u00d6rebro University","ror":"https://ror.org/05kytsw45","country_code":"SE","type":"education","lineage":["https://openalex.org/I26437253"]},{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK","SE"],"is_corresponding":false,"raw_author_name":"Nicola Dragoni","raw_affiliation_strings":["Centre for Applied Autonomous Sensor Systems, \u00d6rebro University, Sweden","DTU Compute, Technical University of Denmark, Denmark"],"affiliations":[{"raw_affiliation_string":"Centre for Applied Autonomous Sensor Systems, \u00d6rebro University, Sweden","institution_ids":["https://openalex.org/I26437253"]},{"raw_affiliation_string":"DTU Compute, Technical University of Denmark, Denmark","institution_ids":["https://openalex.org/I96673099"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066856623","display_name":"Angelo Spognardi","orcid":"https://orcid.org/0000-0001-6935-0701"},"institutions":[{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Angelo Spognardi","raw_affiliation_strings":["Dipartimento Informatica, Sapienza Universit\u00e0 di Roma, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento Informatica, Sapienza Universit\u00e0 di Roma, Italy","institution_ids":["https://openalex.org/I861853513"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5066856623"],"corresponding_institution_ids":["https://openalex.org/I861853513"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.3317,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.57118699,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"2018","issue":null,"first_page":"1","last_page":"15"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9016637802124023},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7873834371566772},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6728119850158691},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5104238390922546},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.49049657583236694},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.4366912543773651},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3911122679710388},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3363591432571411},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3183336555957794},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2008156180381775}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9016637802124023},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7873834371566772},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6728119850158691},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5104238390922546},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.49049657583236694},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.4366912543773651},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3911122679710388},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3363591432571411},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3183336555957794},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2008156180381775},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1155/2018/4672072","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2018/4672072","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:iris.uniroma1.it:11573/1165514","is_oa":true,"landing_page_url":"http://hdl.handle.net/11573/1165514","pdf_url":"http://hdl.handle.net/11573/1165514","source":{"id":"https://openalex.org/S4377196107","display_name":"IRIS Research product catalog (Sapienza University of Rome)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:doaj.org/article:62669be85fd544d38f82ca749aaea544","is_oa":true,"landing_page_url":"https://doaj.org/article/62669be85fd544d38f82ca749aaea544","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2018 (2018)","raw_type":"article"},{"id":"pmh:oai:hindawi.com:10.1155/2018/4672072","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/4672072","pdf_url":null,"source":{"id":"https://openalex.org/S4306400340","display_name":"Hindawi Journal of Chemistry (Hindawi)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210126990","host_organization_name":"Hindawi (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210126990"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Research Article"},{"id":"pmh:oai:pure.atira.dk:publications/31b282ca-2029-4d95-b575-4306047422e5","is_oa":true,"landing_page_url":"https://orbit.dtu.dk/en/publications/31b282ca-2029-4d95-b575-4306047422e5","pdf_url":null,"source":{"id":"https://openalex.org/S4306400705","display_name":"Technical University of Denmark, DTU Orbit (Technical University of Denmark, DTU)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I96673099","host_organization_name":"Technical University of Denmark","host_organization_lineage":["https://openalex.org/I96673099"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Argyriou , M , Dragoni , N &amp; Spognardi , A 2018 , ' Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications ' , Security and Communication Networks , vol. 2018 , 4672072 . https://doi.org/10.1155/2018/4672072","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2018/4672072","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2018/4672072","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.75,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1475919040","https://openalex.org/W1532142362","https://openalex.org/W1943233084","https://openalex.org/W1972136176","https://openalex.org/W2060692877","https://openalex.org/W2215444025","https://openalex.org/W2292824616","https://openalex.org/W2528211676","https://openalex.org/W2557385690","https://openalex.org/W2590530900","https://openalex.org/W2591102410","https://openalex.org/W2802756541"],"related_works":["https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W2610659201","https://openalex.org/W2591124010","https://openalex.org/W3200508744","https://openalex.org/W3025122950","https://openalex.org/W2311926078","https://openalex.org/W2717179875","https://openalex.org/W4249118297","https://openalex.org/W2791662519"],"abstract_inverted_index":{"Android":[0,71,117,177],"smartphones":[1],"have":[2],"become":[3],"a":[4,16,61,144,169,231],"vital":[5],"component":[6],"of":[7,11,13,18,47,81,88,97,139,147,154,182,192,210],"the":[8,22,45,55,85,116,127,152,180,183,208],"daily":[9],"routine":[10],"millions":[12],"people,":[14],"running":[15],"plethora":[17],"applications":[19],"available":[20],"in":[21,95,151,186],"official":[23],"and":[24,35,64,92,101,149,162,175,228],"alternative":[25],"marketplaces.":[26],"Although":[27],"there":[28],"are":[29],"many":[30,48,136],"security":[31,118],"mechanisms":[32],"to":[33,43,106,120,123,134,156,197,203],"scan":[34],"filter":[36],"malicious":[37],"applications,":[38,72],"malware":[39],"is":[40,60,105,194,201],"still":[41],"able":[42],"reach":[44,218],"devices":[46],"end-users.":[49],"In":[50],"this":[51],"paper,":[52],"we":[53],"introduce":[54],"SafeDroid":[56,128,215],"v2.0":[57,129,216],"framework,":[58],"that":[59,111,214],"flexible,":[62],"robust,":[63],"versatile":[65],"open-source":[66],"solution":[67],"for":[68,171,179],"statically":[69],"analysing":[70],"based":[73],"on":[74],"machine":[75,140],"learning":[76,141],"techniques.":[77],"The":[78,165],"main":[79],"goal":[80],"our":[82,211],"work,":[83],"besides":[84],"automated":[86],"production":[87],"fully":[89],"sufficient":[90],"prediction":[91],"classification":[93],"models":[94,185],"terms":[96],"maximum":[98],"accuracy":[99],"scores":[100],"minimum":[102],"negative":[103],"errors,":[104],"offer":[107],"an":[108,176],"out-of-the-box":[109],"framework":[110,130,166],"can":[112,217],"be":[113],"employed":[114],"by":[115],"researchers":[119],"efficiently":[121,204],"experiment":[122,173],"find":[124,205],"effective":[125],"solutions:":[126,207],"makes":[131],"it":[132,200],"possible":[133,202],"test":[135],"different":[137],"combinations":[138],"classifiers,":[142],"with":[143,223,230],"high":[145],"degree":[146],"freedom":[148],"flexibility":[150],"choice":[153],"features":[155],"consider,":[157],"such":[158],"as":[159],"dataset":[160,163,226],"balance":[161],"selection.":[164],"also":[167,195],"provides":[168],"server,":[170],"generating":[172],"reports,":[174],"application,":[178],"verification":[181],"produced":[184],"real-life":[187],"scenarios.":[188],"An":[189],"extensive":[190],"campaign":[191],"experiments":[193,212],"presented":[196],"show":[198],"how":[199],"competitive":[206],"results":[209],"confirm":[213],"very":[219,232],"good":[220],"performances,":[221],"even":[222],"highly":[224],"unbalanced":[225],"inputs":[227],"always":[229],"limited":[233],"overhead.":[234]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
