{"id":"https://openalex.org/W2292824616","doi":"https://doi.org/10.1002/sec.1430","title":"DroidScreening: a practical framework for real\u2010world Android malware analysis","display_name":"DroidScreening: a practical framework for real\u2010world Android malware analysis","publication_year":2016,"publication_date":"2016-02-10","ids":{"openalex":"https://openalex.org/W2292824616","doi":"https://doi.org/10.1002/sec.1430","mag":"2292824616"},"language":"en","primary_location":{"id":"doi:10.1002/sec.1430","is_oa":true,"landing_page_url":"https://doi.org/10.1002/sec.1430","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/sec.1430","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/sec.1430","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100293978","display_name":"Junfeng Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]},{"id":"https://openalex.org/I43922553","display_name":"Wuhan University of Science and Technology","ror":"https://ror.org/00e4hrk88","country_code":"CN","type":"education","lineage":["https://openalex.org/I43922553"]}],"countries":["CN","SG"],"is_corresponding":true,"raw_author_name":"Junfeng Yu","raw_affiliation_strings":["College of Computer Science and Technology Wuhan University of Science and Technology  Wuhan Hubei China","Cryptography and Security Department Institute for Infocomm Research  Singapore","Hubei Province Key Laboratory of Intelligent Information Processing and Real\u2010time Industrial System  Wuhan China","College of Computer Science and Technology; Wuhan University of Science and Technology; Wuhan Hubei China; Cryptography and Security Department; Institute for Infocomm Research; Singapore; Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System; Wuhan China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology Wuhan University of Science and Technology  Wuhan Hubei China","institution_ids":["https://openalex.org/I43922553"]},{"raw_affiliation_string":"Cryptography and Security Department Institute for Infocomm Research  Singapore","institution_ids":["https://openalex.org/I3005327000"]},{"raw_affiliation_string":"Hubei Province Key Laboratory of Intelligent Information Processing and Real\u2010time Industrial System  Wuhan China","institution_ids":[]},{"raw_affiliation_string":"College of Computer Science and Technology; Wuhan University of Science and Technology; Wuhan Hubei China; Cryptography and Security Department; Institute for Infocomm Research; Singapore; Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System; Wuhan China","institution_ids":["https://openalex.org/I3005327000","https://openalex.org/I43922553"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032939886","display_name":"Qingfeng Huang","orcid":"https://orcid.org/0000-0002-7334-570X"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingfeng Huang","raw_affiliation_strings":["Network and Computation Center Huazhong University of Science and Technology  Wuhan China","Network and Computation Center; Huazhong University of Science and Technology; Wuhan China"],"affiliations":[{"raw_affiliation_string":"Network and Computation Center Huazhong University of Science and Technology  Wuhan China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Network and Computation Center; Huazhong University of Science and Technology; Wuhan China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112052416","display_name":"CheeHoo Yian","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"CheeHoo Yian","raw_affiliation_strings":["Hubei Province Key Laboratory of Intelligent Information Processing and Real\u2010time Industrial System  Wuhan China","Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System; Wuhan China"],"affiliations":[{"raw_affiliation_string":"Hubei Province Key Laboratory of Intelligent Information Processing and Real\u2010time Industrial System  Wuhan China","institution_ids":[]},{"raw_affiliation_string":"Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System; Wuhan China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100293978"],"corresponding_institution_ids":["https://openalex.org/I3005327000","https://openalex.org/I43922553"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":null,"fwci":1.0087,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.75342384,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"9","issue":"11","first_page":"1435","last_page":"1449"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8970240354537964},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8764450550079346},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.7733036279678345},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7425236701965332},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.6071078181266785},{"id":"https://openalex.org/keywords/heuristics","display_name":"Heuristics","score":0.588939905166626},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4759792387485504},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.45529770851135254},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.41857320070266724},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3254537582397461},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2945669889450073},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1278737485408783}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8970240354537964},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8764450550079346},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.7733036279678345},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7425236701965332},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.6071078181266785},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.588939905166626},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4759792387485504},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.45529770851135254},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41857320070266724},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3254537582397461},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2945669889450073},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1278737485408783}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/sec.1430","is_oa":true,"landing_page_url":"https://doi.org/10.1002/sec.1430","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/sec.1430","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1002/sec.1430","is_oa":true,"landing_page_url":"https://doi.org/10.1002/sec.1430","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/sec.1430","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6100000143051147,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":true},"content_urls":{"grobid_xml":"https://content.openalex.org/works/W2292824616.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W7469215","https://openalex.org/W81879861","https://openalex.org/W146651671","https://openalex.org/W259338706","https://openalex.org/W1489067988","https://openalex.org/W1544837488","https://openalex.org/W1680232729","https://openalex.org/W1865564993","https://openalex.org/W1943233084","https://openalex.org/W1964241047","https://openalex.org/W1971497680","https://openalex.org/W1986330503","https://openalex.org/W1990649188","https://openalex.org/W1994588724","https://openalex.org/W2030216533","https://openalex.org/W2058180826","https://openalex.org/W2060537671","https://openalex.org/W2060782570","https://openalex.org/W2091540464","https://openalex.org/W2095470000","https://openalex.org/W2101834106","https://openalex.org/W2105412867","https://openalex.org/W2109363337","https://openalex.org/W2118938540","https://openalex.org/W2121221235","https://openalex.org/W2125011234","https://openalex.org/W2142145056","https://openalex.org/W2154642793","https://openalex.org/W2156368183","https://openalex.org/W2158888459","https://openalex.org/W2164539435","https://openalex.org/W2398484989","https://openalex.org/W2399891510"],"related_works":["https://openalex.org/W4285507391","https://openalex.org/W4249118297","https://openalex.org/W2610659201","https://openalex.org/W2717179875","https://openalex.org/W77168003","https://openalex.org/W3107556205","https://openalex.org/W65788704","https://openalex.org/W2791662519","https://openalex.org/W2183925834","https://openalex.org/W3036603968"],"abstract_inverted_index":{"Abstract":[0],"Analyzing":[1],"Android":[2,44,83,100],"malware":[3,45,118],"sample":[4],"is":[5,22],"a":[6,34,90],"time\u2010consuming":[7],"and":[8,18,48,120,143],"error\u2010prone":[9],"work.":[10,150],"Automatic":[11],"techniques":[12],"to":[13,40,49,67,109],"perform":[14],"suspicious":[15],"apps":[16],"screening":[17],"threat":[19],"level":[20],"evaluation":[21],"highly":[23],"desired":[24],"by":[25,71,78],"the":[26,43,55,104,129,139],"antivirus":[27,51],"industry.":[28],"In":[29],"this":[30],"paper,":[31],"we":[32,88,137],"proposed":[33,89],"novel":[35,91],"automated":[36],"framework":[37],"called":[38],"DroidScreening":[39,60,142],"speed":[41],"up":[42],"analysis":[46,81,105],"process":[47],"assist":[50],"analyst":[52],"in":[53],"generating":[54],"heuristics":[56],"pattern":[57],"for":[58],"scanner.":[59],"employs":[61],"lazy":[62],"associative":[63],"classification":[64,69,134],"(LAC)":[65],"algorithms":[66,131],"produce":[68],"model":[70],"learning":[72,125],"from":[73],"malicious":[74,99,114],"evidence":[75],"features":[76],"extracted":[77],"using":[79,121],"static":[80],"on":[82,117],"application":[84],"package":[85],"files.":[86],"Moreover,":[87],"high\u2010interaction":[92],"execution":[93],"environment":[94],"that":[95,103,128],"can":[96],"interact":[97],"with":[98,123,146],"code,":[101],"so":[102],"samples":[106],"are":[107],"induced":[108],"start":[110],"executing":[111],"their":[112],"true":[113],"behavior.":[115],"Experimentation":[116],"datasets":[119],"LAC":[122,130],"traditional":[124],"approaches":[126],"show":[127],"outperformed":[132],"other":[133,147],"algorithms.":[135],"Finally,":[136],"analyzed":[138],"performance":[140],"of":[141],"compare":[144],"it":[145],"similar":[148],"research":[149],"Copyright":[151],"\u00a9":[152],"2016":[153],"John":[154],"Wiley":[155],"&amp;":[156],"Sons,":[157],"Ltd.":[158]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
