{"id":"https://openalex.org/W4411831488","doi":"https://doi.org/10.32604/cmc.2025.066198","title":"Lightweight and Robust Android Ransomware Detection Using Behavioral Analysis and Feature Reduction","display_name":"Lightweight and Robust Android Ransomware Detection Using Behavioral Analysis and Feature Reduction","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4411831488","doi":"https://doi.org/10.32604/cmc.2025.066198"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.066198","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.066198","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.066198","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064288735","display_name":"Muhammad Sibtain","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Muhammad Sibtain","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042894614","display_name":"Mehdi Hussain","orcid":"https://orcid.org/0000-0003-4321-2532"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mehdi Hussain","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002417888","display_name":"Qaiser Riaz","orcid":"https://orcid.org/0000-0003-3722-4764"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qaiser Riaz","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078948632","display_name":"Sana Qadir","orcid":"https://orcid.org/0000-0002-3594-2925"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sana Qadir","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029566251","display_name":"Naveed Riaz","orcid":"https://orcid.org/0000-0001-5770-2554"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Naveed Riaz","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5050172238","display_name":"Ki\u2010Hyun Jung","orcid":"https://orcid.org/0000-0002-0662-8355"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ki-Hyun Jung","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5064288735"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":6.4401,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.96654489,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":100},"biblio":{"volume":"84","issue":"3","first_page":"5177","last_page":"5199"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12799","display_name":"Mobile and Web Applications","score":0.9778000116348267,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12016","display_name":"Web Data Mining and Analysis","score":0.940500020980835,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.8723667860031128},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6813051104545593},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6270347833633423},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.49200960993766785},{"id":"https://openalex.org/keywords/android-application","display_name":"Android application","score":0.4136131703853607},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38736844062805176},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3236082196235657},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.2020752727985382}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.8723667860031128},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6813051104545593},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6270347833633423},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.49200960993766785},{"id":"https://openalex.org/C3017891749","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android application","level":3,"score":0.4136131703853607},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38736844062805176},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3236082196235657},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.2020752727985382}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.066198","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.066198","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.066198","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.066198","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W2910470804","https://openalex.org/W2966789963","https://openalex.org/W3028767182","https://openalex.org/W3035775076","https://openalex.org/W3112175136","https://openalex.org/W3161054997","https://openalex.org/W3187102702","https://openalex.org/W4210285013","https://openalex.org/W4213449907","https://openalex.org/W4311080346","https://openalex.org/W4312724275","https://openalex.org/W4380372993","https://openalex.org/W4384787757","https://openalex.org/W4386074205","https://openalex.org/W4389454898","https://openalex.org/W4390562648","https://openalex.org/W4390726136","https://openalex.org/W4391540795","https://openalex.org/W4392698190","https://openalex.org/W4392741075","https://openalex.org/W4393127076","https://openalex.org/W4396803152","https://openalex.org/W4399352133","https://openalex.org/W4400939031","https://openalex.org/W4402615287","https://openalex.org/W4402918477"],"related_works":["https://openalex.org/W4226442484","https://openalex.org/W2591124010","https://openalex.org/W1565885216","https://openalex.org/W3162241107","https://openalex.org/W4281384336","https://openalex.org/W2889975722","https://openalex.org/W2781346976","https://openalex.org/W2401343441","https://openalex.org/W4313495843","https://openalex.org/W4291961149"],"abstract_inverted_index":{"Ransomware":[0],"is":[1,17],"malware":[2],"that":[3,148],"encrypts":[4],"data":[5],"without":[6],"permission,":[7],"demanding":[8],"payment":[9],"for":[10,55,125,188],"access.":[11],"Detecting":[12],"ransomware":[13,57,70,89,201],"on":[14,60,86],"Android":[15,56],"platforms":[16],"challenging":[18],"due":[19],"to":[20,51,157],"evolving":[21,97],"malicious":[22],"techniques":[23,175],"and":[24,33,41,81,99,127,144,164,198],"diverse":[25],"application":[26],"behaviors.":[27],"Traditional":[28],"methods,":[29],"such":[30],"as":[31],"static":[32],"dynamic":[34],"analysis,":[35],"suffer":[36],"from":[37],"polymorphism,":[38],"code":[39],"obfuscation,":[40],"high":[42,178],"resource":[43],"demands.":[44],"This":[45],"paper":[46],"introduces":[47],"a":[48,61,112,158,182],"multi-stage":[49],"approach":[50,68,172],"enhance":[52],"behavioral":[53,73],"analysis":[54],"detection,":[58],"focusing":[59],"reduced":[62,106,152],"set":[63,154],"of":[64,115,140],"distinguishing":[65],"features.":[66],"The":[67,101,170],"includes":[69],"app":[71],"collection,":[72],"profile":[74],"generation,":[75],"dataset":[76],"creation,":[77],"feature":[78,102,153,184],"identification,":[79],"reduction,":[80],"classification.":[82],"Experiments":[83],"were":[84],"conducted":[85],"\u223c3300":[87],"Android-based":[88],"samples,":[90],"despite":[91],"the":[92,151],"challenges":[93],"posed":[94],"by":[95,108,176],"their":[96],"nature":[98],"complexity.":[100],"reduction":[103,160],"strategy":[104],"successfully":[105],"features":[107],"80%,":[109],"with":[110,181],"only":[111],"marginal":[113],"loss":[114],"detection":[116,130,179],"accuracy":[117,180],"(0.59%).":[118],"Different":[119],"machine":[120],"learning":[121],"algorithms":[122],"are":[123],"employed":[124],"classification":[126],"achieve":[128],"96.71%":[129],"accuracy.":[131],"Additionally,":[132],"10-fold":[133],"cross-validation":[134],"demonstrated":[135],"robustness,":[136],"yielding":[137],"an":[138],"AUC-ROC":[139],"99.3%.":[141],"Importantly,":[142],"latency":[143],"memory":[145,166],"evaluations":[146],"revealed":[147],"models":[149],"using":[150],"achieved":[155],"up":[156],"99%":[159],"in":[161,190],"inference":[162],"time":[163],"significant":[165],"savings":[167],"across":[168],"classifiers.":[169],"proposed":[171],"outperforms":[173],"existing":[174],"achieving":[177],"minimal":[183],"set,":[185],"also":[186],"suitable":[187],"deployment":[189],"resource-constrained":[191],"environments.":[192],"Future":[193],"work":[194],"may":[195],"extend":[196],"datasets":[197],"include":[199],"iOS-based":[200],"applications.":[202]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2025-10-10T00:00:00"}
