References
- I. Martin, J. A. Hernandez, A. Munoz, and A. Guzman, "Android Malware Characterization Using Metadata and Machine Learning Techniques," Secur. Commun. Networks, 2018, doi: 10.1155/2018/5749481.
- S. Priyadharshini and S. Shanthi, "A Survey on Detecting Android Malware Using Machine Learning Technique," 2021, doi: 10.1109/ICACCS51430.2021.9441712.
- A. N. Jahromi, S. Hashemi, A. Dehghantanha, R. M. Parizi, and K. K. R. Choo, "An Enhanced Stacked LSTM Method with No Random Initialization for Malware Threat Hunting in Safety and Time-Critical Systems," IEEE Trans. Emerg. Top. Comput. Intell., 2020, doi: 10.1109/TETCI.2019.2910243.
- J. Garcia, M. Hammad, and S. Malek, "Lightweight, obfuscation-Resilient detection and family identification of android malware," ACM Trans. Softw. Eng. Methodol., 2018, doi: 10.1145/3162625.
- S. Gupta, S. Sethi, S. Chaudhary, and A. Arora, "Blockchain Based Detection of Android Malware using Ranked Permissions," Int. J. Eng. Adv. Technol., 2021, doi: 10.35940/ijeat.e2593.0610521.
- M. Melis et al., "Do gradient-based explanations tell anything about adversarial robustness to android malware?," Int. J. Mach. Learn. Cybern., 2021, doi: 10.1007/s13042-021-01393-7.
- S. Y. Yerima, S. Sezer, and I. Muttik, "High accuracy android malware detection using ensemble learning," IET Inf. Secur., 2015, doi: 10.1049/iet-ifs.2014.0099.
- H. Zhang, D. Yao, and N. Ramakrishnan, "Causality-based sensemaking of network traffic for android application security," 2016, doi: 10.1145/2996758.2996760.
- G. Canfora, F. Mercaldo, E. Medvet, and C. A. Visaggio, "Detecting Android malware using sequences of system calls," 2015, doi: 10.1145/2804345.2804349.
- S. I. Imtiaz, S. ur Rehman, A. R. Javed, Z. Jalil, X. Liu, and W. S. Alnumay, "DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network," Futur. Gener. Comput. Syst., 2021, doi: 10.1016/j.future.2020.10.008.
- J. Senanayake, H. Kalutarage, and M. O. Al-Kadri, "Android mobile malware detection using machine learning: A systematic review," Electronics (Switzerland). 2021, doi: 10.3390/electronics10131606.
- E. J. Alqahtani, R. Zagrouba, and A. Almuhaideb, "A survey on android malware detection techniques using machine learning Algorithms," 2019, doi: 10.1109/SDS.2019.8768729.
- O. C. Abikoye, B. A. Gyunka, and O. N. Akande, "Android malware detection through machine learning techniques: A review," Int. J. online Biomed. Eng., vol. 16, no. 2, pp. 14-30, 2020, doi: 10.3991/ijoe.v16i02.11549.
- T. A. A. Abdullah, W. Ali, and R. Abdulghafor, "Empirical study on intelligent android malware detection based on supervised machine learning," Int. J. Adv. Comput. Sci. Appl., vol. 11, no. 4, pp. 215-224, 2020, doi: 10.14569/IJACSA.2020.0110429.
- F. Mercaldo and A. Santone, "Formal Equivalence Checking for Mobile Malware Detection and Family Classification," IEEE Trans. Softw. Eng., 2021, doi: 10.1109/TSE.2021.3067061.
- S. M. Shahidi, H. Shakeri, and M. Jalali, "A semantic malware detection model based on the GMDH neural networks," Comput. Electr. Eng., 2021, doi: 10.1016/j.compeleceng.2021.107099.