{"id":"https://openalex.org/W4385977738","doi":"https://doi.org/10.3390/informatics10030067","title":"A Proposed Artificial Intelligence Model for Android-Malware Detection","display_name":"A Proposed Artificial Intelligence Model for Android-Malware Detection","publication_year":2023,"publication_date":"2023-08-18","ids":{"openalex":"https://openalex.org/W4385977738","doi":"https://doi.org/10.3390/informatics10030067"},"language":"en","primary_location":{"id":"doi:10.3390/informatics10030067","is_oa":true,"landing_page_url":"https://doi.org/10.3390/informatics10030067","pdf_url":"https://www.mdpi.com/2227-9709/10/3/67/pdf?version=1692357034","source":{"id":"https://openalex.org/S2738238905","display_name":"Informatics","issn_l":"2227-9709","issn":["2227-9709"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2227-9709/10/3/67/pdf?version=1692357034","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015357458","display_name":"Fatma Taher","orcid":"https://orcid.org/0000-0001-8358-9081"},"institutions":[{"id":"https://openalex.org/I91044093","display_name":"Zayed University","ror":"https://ror.org/03snqfa66","country_code":"AE","type":"education","lineage":["https://openalex.org/I91044093"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Fatma Taher","raw_affiliation_strings":["College of Technological Innovation, Zayed University, Dubai 19282, United Arab Emirates"],"raw_orcid":"https://orcid.org/0000-0001-8358-9081","affiliations":[{"raw_affiliation_string":"College of Technological Innovation, Zayed University, Dubai 19282, United Arab Emirates","institution_ids":["https://openalex.org/I91044093"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092660960","display_name":"Omar Al Fandi","orcid":null},"institutions":[{"id":"https://openalex.org/I91044093","display_name":"Zayed University","ror":"https://ror.org/03snqfa66","country_code":"AE","type":"education","lineage":["https://openalex.org/I91044093"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Omar Al Fandi","raw_affiliation_strings":["College of Technological Innovation, Zayed University, Dubai 19282, United Arab Emirates"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Technological Innovation, Zayed University, Dubai 19282, United Arab Emirates","institution_ids":["https://openalex.org/I91044093"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029864476","display_name":"Mousa Al-kfairy","orcid":"https://orcid.org/0000-0003-3180-3861"},"institutions":[{"id":"https://openalex.org/I91044093","display_name":"Zayed University","ror":"https://ror.org/03snqfa66","country_code":"AE","type":"education","lineage":["https://openalex.org/I91044093"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Mousa Al Kfairy","raw_affiliation_strings":["College of Technological Innovation, Zayed University, Dubai 19282, United Arab Emirates"],"raw_orcid":"https://orcid.org/0000-0003-3180-3861","affiliations":[{"raw_affiliation_string":"College of Technological Innovation, Zayed University, Dubai 19282, United Arab Emirates","institution_ids":["https://openalex.org/I91044093"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016925365","display_name":"Hussam Al Hamadi","orcid":"https://orcid.org/0000-0002-1353-4138"},"institutions":[{"id":"https://openalex.org/I132806614","display_name":"University of Dubai","ror":"https://ror.org/05h0z7c09","country_code":"AE","type":"education","lineage":["https://openalex.org/I132806614"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Hussam Al Hamadi","raw_affiliation_strings":["College of Engineering and IT, University of Dubai, Dubai 14143, United Arab Emirates"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Engineering and IT, University of Dubai, Dubai 14143, United Arab Emirates","institution_ids":["https://openalex.org/I132806614"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000085565","display_name":"Saed Alrabaee","orcid":"https://orcid.org/0000-0001-8842-493X"},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Saed Alrabaee","raw_affiliation_strings":["College of Information Technology, United Arab Emirates University, Al Ain 15551, United Arab Emirates"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Information Technology, United Arab Emirates University, Al Ain 15551, United Arab Emirates","institution_ids":["https://openalex.org/I201726411"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5015357458"],"corresponding_institution_ids":["https://openalex.org/I91044093"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":1.1514,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.78867224,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"10","issue":"3","first_page":"67","last_page":"67"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9815999865531921,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9751999974250793,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8999447226524353},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7953965663909912},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.7195075750350952},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.687293529510498},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6291015148162842},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5965850949287415},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.531907320022583},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4687037169933319},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27089688181877136},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10108906030654907}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8999447226524353},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7953965663909912},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.7195075750350952},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.687293529510498},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6291015148162842},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5965850949287415},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.531907320022583},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4687037169933319},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27089688181877136},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10108906030654907}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/informatics10030067","is_oa":true,"landing_page_url":"https://doi.org/10.3390/informatics10030067","pdf_url":"https://www.mdpi.com/2227-9709/10/3/67/pdf?version=1692357034","source":{"id":"https://openalex.org/S2738238905","display_name":"Informatics","issn_l":"2227-9709","issn":["2227-9709"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Informatics","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:7a09c3ff209e468a9e077ee5a92ffdcb","is_oa":true,"landing_page_url":"https://doaj.org/article/7a09c3ff209e468a9e077ee5a92ffdcb","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Informatics, Vol 10, Iss 3, p 67 (2023)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/2227-9709/10/3/67/","is_oa":true,"landing_page_url":"https://dx.doi.org/10.3390/informatics10030067","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Informatics; Volume 10; Issue 3; Pages: 67","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/informatics10030067","is_oa":true,"landing_page_url":"https://doi.org/10.3390/informatics10030067","pdf_url":"https://www.mdpi.com/2227-9709/10/3/67/pdf?version=1692357034","source":{"id":"https://openalex.org/S2738238905","display_name":"Informatics","issn_l":"2227-9709","issn":["2227-9709"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Informatics","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320325295","display_name":"Zayed University","ror":"https://ror.org/03snqfa66"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4385977738.pdf"},"referenced_works_count":60,"referenced_works":["https://openalex.org/W2966661","https://openalex.org/W1529004212","https://openalex.org/W1538131130","https://openalex.org/W1673310716","https://openalex.org/W1966023382","https://openalex.org/W2009272467","https://openalex.org/W2064675550","https://openalex.org/W2080157505","https://openalex.org/W2114275288","https://openalex.org/W2122672392","https://openalex.org/W2125011234","https://openalex.org/W2131744502","https://openalex.org/W2138615112","https://openalex.org/W2167003418","https://openalex.org/W2170770919","https://openalex.org/W2407313496","https://openalex.org/W2548979822","https://openalex.org/W2573206337","https://openalex.org/W2591102410","https://openalex.org/W2622826443","https://openalex.org/W2735043505","https://openalex.org/W2751702350","https://openalex.org/W2789983203","https://openalex.org/W2809616033","https://openalex.org/W2825974271","https://openalex.org/W2849849680","https://openalex.org/W2909991551","https://openalex.org/W2939746199","https://openalex.org/W2945015800","https://openalex.org/W2963204406","https://openalex.org/W2964136807","https://openalex.org/W3004549544","https://openalex.org/W3005555687","https://openalex.org/W3015269186","https://openalex.org/W3038645823","https://openalex.org/W3038778287","https://openalex.org/W3039611570","https://openalex.org/W3083703328","https://openalex.org/W3092079294","https://openalex.org/W3092817161","https://openalex.org/W3094190102","https://openalex.org/W3118343432","https://openalex.org/W3125601055","https://openalex.org/W3134221566","https://openalex.org/W3135916744","https://openalex.org/W3157056612","https://openalex.org/W3160238701","https://openalex.org/W3169356041","https://openalex.org/W3172817683","https://openalex.org/W3176448712","https://openalex.org/W3195672100","https://openalex.org/W3210577968","https://openalex.org/W3214641118","https://openalex.org/W4200247652","https://openalex.org/W4205382418","https://openalex.org/W4205876068","https://openalex.org/W4311046894","https://openalex.org/W4313180313","https://openalex.org/W6637131181","https://openalex.org/W6678217462"],"related_works":["https://openalex.org/W2782775281","https://openalex.org/W4312334973","https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W4327939473","https://openalex.org/W2085301524","https://openalex.org/W2591124010","https://openalex.org/W4311848503","https://openalex.org/W2717179875","https://openalex.org/W4249118297"],"abstract_inverted_index":{"There":[0],"are":[1,19],"a":[2,37,119],"variety":[3],"of":[4,31,65,68,74,115,139,153],"reasons":[5],"why":[6],"smartphones":[7],"have":[8],"grown":[9],"so":[10],"pervasive":[11],"in":[12,101,117],"our":[13],"daily":[14],"lives.":[15],"While":[16],"their":[17,189],"benefits":[18,135],"undeniable,":[20],"Android":[21,42,60],"users":[22],"must":[23],"be":[24],"vigilant":[25],"against":[26],"malicious":[27],"apps.":[28],"The":[29],"goal":[30],"this":[32,49],"study":[33],"was":[34,51,159],"to":[35,90,103,107,123,149,187],"develop":[36],"broad":[38,109],"framework":[39,50,71],"for":[40],"detecting":[41],"malware":[43,61,110,127,130],"using":[44],"multiple":[45],"deep":[46,80,120],"learning":[47,81],"classifiers;":[48],"given":[52],"the":[53,70,104,125,154,162,170],"name":[54],"DroidMDetection.":[55],"To":[56],"provide":[57],"precise,":[58],"dynamic,":[59],"detection":[62,157],"and":[63,82,99,133,142,161,180],"clustering":[64],"different":[66],"families":[67],"malware,":[69],"makes":[72],"use":[73],"unique":[75],"methodologies":[76],"built":[77],"based":[78],"on":[79],"natural":[83],"language":[84],"processing":[85],"(NLP)":[86],"techniques.":[87],"When":[88],"compared":[89],"other":[91],"similar":[92],"works,":[93],"DroidMDetection":[94,173],"(1)":[95],"uses":[96,113],"API":[97],"calls":[98],"intents":[100],"addition":[102],"common":[105],"permissions":[106],"accomplish":[108],"analysis,":[111],"(2)":[112],"digests":[114],"features":[116],"which":[118],"auto-encoder":[121],"generates":[122],"cluster":[124],"detected":[126],"samples":[128],"into":[129],"family":[131],"groups,":[132],"(3)":[134],"from":[136],"both":[137],"methods":[138],"feature":[140],"extraction":[141],"selection.":[143],"Numerous":[144],"reference":[145],"datasets":[146],"were":[147,165],"used":[148,186],"conduct":[150],"in-depth":[151],"analyses":[152],"framework.":[155],"DroidMDetection\u2019s":[156],"rate":[158],"high,":[160],"created":[163],"clusters":[164],"relatively":[166],"consistent,":[167],"no":[168],"matter":[169],"evaluation":[171],"parameters.":[172],"surpasses":[174],"state-of-the-art":[175],"solutions":[176],"MaMaDroid,":[177],"DroidMalwareDetector,":[178],"MalDozer,":[179],"DroidAPIMiner":[181],"across":[182],"all":[183],"metrics":[184],"we":[185],"measure":[188],"effectiveness.":[190]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2}],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2023-08-19T00:00:00"}
