{"id":"https://openalex.org/W2798475512","doi":"https://doi.org/10.4018/jgim.2018070105","title":"Community Based Feature Selection Method for Detection of Android Malware","display_name":"Community Based Feature Selection Method for Detection of Android Malware","publication_year":2018,"publication_date":"2018-04-16","ids":{"openalex":"https://openalex.org/W2798475512","doi":"https://doi.org/10.4018/jgim.2018070105","mag":"2798475512"},"language":"en","primary_location":{"id":"doi:10.4018/jgim.2018070105","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jgim.2018070105","pdf_url":null,"source":{"id":"https://openalex.org/S83591844","display_name":"Journal of Global Information Management","issn_l":"1062-7375","issn":["1062-7375","1533-7995"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Global Information Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101889001","display_name":"Abhishek Bhattacharya","orcid":"https://orcid.org/0000-0003-3369-3002"},"institutions":[{"id":"https://openalex.org/I1296725772","display_name":"University of Engineering & Management","ror":"https://ror.org/02decng19","country_code":"IN","type":"education","lineage":["https://openalex.org/I1296725772"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Abhishek Bhattacharya","raw_affiliation_strings":["Institute of Engineering & Management, Kolkata, India"],"affiliations":[{"raw_affiliation_string":"Institute of Engineering & Management, Kolkata, India","institution_ids":["https://openalex.org/I1296725772"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075388289","display_name":"Radha Tamal Goswami","orcid":"https://orcid.org/0000-0001-5307-3666"},"institutions":[{"id":"https://openalex.org/I115715567","display_name":"Birla Institute of Technology, Mesra","ror":"https://ror.org/028vtqb15","country_code":"IN","type":"education","lineage":["https://openalex.org/I115715567"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Radha Tamal Goswami","raw_affiliation_strings":["Birla Institute of Technology, Mesra, India"],"affiliations":[{"raw_affiliation_string":"Birla Institute of Technology, Mesra, India","institution_ids":["https://openalex.org/I115715567"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101889001"],"corresponding_institution_ids":["https://openalex.org/I1296725772"],"apc_list":null,"apc_paid":null,"fwci":0.8413,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.72511685,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"26","issue":"3","first_page":"54","last_page":"77"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8561711311340332},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.833358883857727},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.7371442914009094},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6989723443984985},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5983275175094604},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.5463569164276123},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5438244342803955},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.5229371786117554},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.48735886812210083},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.453576922416687},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.42090851068496704},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2526211142539978},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1201888918876648}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8561711311340332},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.833358883857727},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.7371442914009094},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6989723443984985},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5983275175094604},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.5463569164276123},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5438244342803955},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.5229371786117554},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.48735886812210083},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.453576922416687},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.42090851068496704},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2526211142539978},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1201888918876648},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/jgim.2018070105","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jgim.2018070105","pdf_url":null,"source":{"id":"https://openalex.org/S83591844","display_name":"Journal of Global Information Management","issn_l":"1062-7375","issn":["1062-7375","1533-7995"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Global Information Management","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jgim00:v:26:y:2018:i:3:p:54-77","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/JGIM.2018070105","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W79549259","https://openalex.org/W101604734","https://openalex.org/W130607548","https://openalex.org/W1424846356","https://openalex.org/W1497733649","https://openalex.org/W1536894494","https://openalex.org/W1647671624","https://openalex.org/W1856835768","https://openalex.org/W1963923654","https://openalex.org/W1973920970","https://openalex.org/W1982730827","https://openalex.org/W1984008582","https://openalex.org/W1999728176","https://openalex.org/W2082173396","https://openalex.org/W2087970742","https://openalex.org/W2122672392","https://openalex.org/W2125011234","https://openalex.org/W2131681506","https://openalex.org/W2142145056","https://openalex.org/W2150747245","https://openalex.org/W2164998314","https://openalex.org/W2415856871","https://openalex.org/W2499995956","https://openalex.org/W2998216295","https://openalex.org/W3099263166","https://openalex.org/W3099768174","https://openalex.org/W3125534699","https://openalex.org/W3128469710","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W4225292389","https://openalex.org/W2559797975","https://openalex.org/W3176707280","https://openalex.org/W3049758233","https://openalex.org/W4210772651","https://openalex.org/W3048702766","https://openalex.org/W1985434400","https://openalex.org/W2063498889","https://openalex.org/W4200493858","https://openalex.org/W4353031795"],"abstract_inverted_index":{"The":[0,121,138],"amount":[1],"of":[2,26,29,33,40,86,100,130,148],"malware":[3,41,101,119,136],"has":[4],"been":[5,77],"rising":[6],"drastically":[7],"as":[8],"the":[9,21,30,43,87,98,109],"Android":[10,118],"operating":[11],"system":[12],"enabled":[13],"smartphones":[14],"and":[15,69,134,150],"tablets":[16],"are":[17],"gaining":[18],"popularity":[19],"around":[20],"world":[22],"in":[23,79,90,97],"last":[24],"couple":[25],"years.":[27],"One":[28],"popular":[31],"methods":[32],"static":[34],"detection":[35,39,83,102],"techniques":[36],"is":[37,84,103,124],"permission/feature-based":[38],"through":[42],"AndroidManifest.xml":[44],"file":[45],"using":[46],"machine":[47],"learning":[48],"classifiers.":[49],"Ignoring":[50],"important":[51],"features":[52,56],"or":[53],"keeping":[54],"irrelevant":[55],"may":[57],"specifically":[58],"cause":[59],"mystification":[60],"to":[61,65,154],"classification":[62,67,146],"algorithms.":[63],"Therefore,":[64],"reduce":[66],"time":[68],"improve":[70],"accuracy,":[71],"different":[72],"feature":[73,114,141],"reduction":[74,115,142],"tools":[75,89],"have":[76],"used":[78],"past":[80],"literature.":[81],"Community":[82],"one":[85],"major":[88],"social":[91],"network":[92],"analysis":[93],"but":[94],"its":[95],"implementation":[96],"context":[99],"quite":[104],"rare.":[105],"In":[106],"this":[107],"article,":[108],"authors":[110],"introduce":[111],"a":[112,145],"community-based":[113,140],"technique":[116,143],"for":[117],"detection.":[120],"proposed":[122,139],"method":[123],"evaluated":[125],"on":[126],"two":[127],"datasets":[128],"consisting":[129],"3004":[131],"benign":[132],"components":[133],"1363":[135],"components.":[137],"produces":[144],"accuracy":[147],"98.20%":[149],"ROC":[151],"value":[152],"up":[153],"0.989.":[155]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
