Multimodal information fusion for android malware detection using lazy learning

Android has a large number of users that are accumulating with each passing day. Security of the Android ecosystem is a major concern for these users with the provision of quality services. In this paper, multimodal analysis of malware apps has been presented. We exploit static, dynamic, and visual...

Full description

Saved in:
Bibliographic Details
Published inMultimedia tools and applications Vol. 81; no. 9; pp. 12077 - 12091
Main Authors Qaisar, Zahid Hussain, Li, Ruixuan
Format Journal Article
LanguageEnglish
Published New York Springer US 01.04.2022
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Android has a large number of users that are accumulating with each passing day. Security of the Android ecosystem is a major concern for these users with the provision of quality services. In this paper, multimodal analysis of malware apps has been presented. We exploit static, dynamic, and visual features of apps to predict the malicious apps using information fusion. The proposed study applies case-based reasoning; for catalyzing the process of training and validation over renowned datasets with enriched feature-set. Our proposed semi-supervised technique uses benign and malicious apps to predict and classify malware. The prediction process uses a hybrid analysis of malware. The proposed approach, due to the efficient and adaptive nature of CBR, outperforms prevalent approaches. Our approach has an accuracy of 95% and reduced rate of false negative rate and a better precision metric, which beat the state-of-the-art techniques.
AbstractList Android has a large number of users that are accumulating with each passing day. Security of the Android ecosystem is a major concern for these users with the provision of quality services. In this paper, multimodal analysis of malware apps has been presented. We exploit static, dynamic, and visual features of apps to predict the malicious apps using information fusion. The proposed study applies case-based reasoning; for catalyzing the process of training and validation over renowned datasets with enriched feature-set. Our proposed semi-supervised technique uses benign and malicious apps to predict and classify malware. The prediction process uses a hybrid analysis of malware. The proposed approach, due to the efficient and adaptive nature of CBR, outperforms prevalent approaches. Our approach has an accuracy of 95% and reduced rate of false negative rate and a better precision metric, which beat the state-of-the-art techniques.
Author Qaisar, Zahid Hussain
Li, Ruixuan
Author_xml – sequence: 1
  givenname: Zahid Hussain
  surname: Qaisar
  fullname: Qaisar, Zahid Hussain
  email: zahidqaisar@hust.edu.cn
  organization: School of Computer Science and Technology, Huazhong University of Science and Technology
– sequence: 2
  givenname: Ruixuan
  surname: Li
  fullname: Li, Ruixuan
  organization: School of Computer Science and Technology, Huazhong University of Science and Technology
BookMark eNp9kE1LxDAQhoOs4O7qH_BU8BzN5KNpj7L4BSt70XNI03Tp0iZr0iLrrze2gjdPMwPP-w48K7Rw3lmEroHcAiHyLgIQTjGhgIFIXuLiDC1BSIalpLBIOysIloLABVrFeCAEckH5Eu1ex25oe1_rLmtd40Ovh9a7rBnjNHzItKuDb-us192nDjar7WDNBCXG7bNOf52yzurg0nWJzhvdRXv1O9fo_fHhbfOMt7unl839FhsG5YC1NbwwXBoqNHALdSVlpXNaGc4aTqFiIGpbGi2LshKskpQWteBMlJwyqyVbo5u59xj8x2jjoA5-DC69VDTnZcFzwSFRdKZM8DEG26hjaHsdTgqI-hGnZnEqiVOTOFWkEJtDMcFub8Nf9T-pbzyqcw4
CitedBy_id crossref_primary_10_1002_ail2_94
crossref_primary_10_1111_exsy_13482
crossref_primary_10_3390_electronics10131606
crossref_primary_10_3390_s22062268
crossref_primary_10_1016_j_eswa_2023_121155
crossref_primary_10_3233_JIFS_231969
crossref_primary_10_1007_s12008_023_01578_0
crossref_primary_10_32604_cmc_2022_030878
Cites_doi 10.1109/TIFS.2018.2866319
10.1109/ACCESS.2020.3002842
10.1016/j.cose.2020.101965
10.3390/s20133645
10.1016/j.cose.2020.101873
10.1016/j.microrel.2019.01.007
10.1016/j.eswa.2019.113062
10.1016/j.cose.2015.02.007
10.1109/TII.2017.2789219
10.1186/s13673-018-0125-x
10.1109/ACCESS.2019.2916886
10.1080/01969722.2016.1262704
10.1109/MCOM.2014.6766089
10.1007/s11042-016-4189-1
10.1145/3384544.3384546
10.1145/2480362.2480701
10.1109/ICCNC.2019.8685502
10.1109/EUC.2018.00010
10.1109/ACCESS.2020.3033026
10.1007/978-3-030-44041-1_117
10.1109/MSR.2015.79
10.1155/2019/7198435
10.1109/ISCO.2016.7726949
10.1007/s40745-020-00265-1
10.1007/978-3-319-12060-7_20
10.1109/ICOSEC49089.2020.9215355
10.1145/3345768.3355915
10.1109/CCST.2018.8585560
10.2991/icmeit-19.2019.60
10.1109/WCNC45663.2020.9120748
10.1145/2901739.2903508
10.1109/SP.2012.16
10.1145/3374664.3375746
10.7494/csci.2019.20.3.3285
10.14722/ndss.2014.23247
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021
The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.
Copyright_xml – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021
– notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.
DBID AAYXX
CITATION
3V.
7SC
7WY
7WZ
7XB
87Z
8AL
8AO
8FD
8FE
8FG
8FK
8FL
8G5
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
CCPQU
DWQXO
FRNLG
F~G
GNUQQ
GUQSH
HCIFZ
JQ2
K60
K6~
K7-
L.-
L7M
L~C
L~D
M0C
M0N
M2O
MBDVC
P5Z
P62
PQBIZ
PQBZA
PQEST
PQQKQ
PQUKI
PRINS
Q9U
DOI 10.1007/s11042-021-10749-8
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Collection
Computing Database (Alumni Edition)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni Edition)
Research Library (Alumni Edition)
ProQuest Central (Alumni)
ProQuest Central
Advanced Technologies & Aerospace Database‎ (1962 - current)
ProQuest Central Essentials
AUTh Library subscriptions: ProQuest Central
ProQuest Business Premium Collection
Technology Collection
ProQuest One Community College
ProQuest Central
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
Research Library Prep
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global (ProQuest)
Computing Database
Research Library (ProQuest)
Research Library (Corporate)
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest One Business
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
DatabaseTitle CrossRef
ABI/INFORM Global (Corporate)
ProQuest Business Collection (Alumni Edition)
ProQuest One Business
Research Library Prep
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
Research Library (Alumni Edition)
ProQuest Pharma Collection
ProQuest Central China
ABI/INFORM Complete
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest Central Korea
ProQuest Research Library
Advanced Technologies Database with Aerospace
ABI/INFORM Complete (Alumni Edition)
Advanced Technologies & Aerospace Collection
Business Premium Collection
ABI/INFORM Global
ProQuest Computing
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Business Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Business (Alumni)
ProQuest One Academic
ProQuest Central (Alumni)
Business Premium Collection (Alumni)
DatabaseTitleList ABI/INFORM Global (Corporate)

Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1573-7721
EndPage 12091
ExternalDocumentID 10_1007_s11042_021_10749_8
GroupedDBID -4Z
-59
-5G
-BR
-EM
-Y2
-~C
.4S
.86
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
2.D
203
28-
29M
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
3EH
3V.
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
7WY
8AO
8FE
8FG
8FL
8G5
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AABYN
AAFGU
AAHNG
AAIAL
AAJKR
AANZL
AAOBN
AAPBV
AARHV
AARTL
AATNV
AATVU
AAUYE
AAWCG
AAWWR
AAYFA
AAYIU
AAYQN
AAYTO
ABBBX
ABBXA
ABDZT
ABECU
ABFGW
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKAS
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACBMV
ACBRV
ACBXY
ACBYP
ACGFO
ACGFS
ACHSB
ACHXU
ACIGE
ACIPQ
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACREN
ACSNA
ACTTH
ACVWB
ACWMK
ADGRI
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADMDM
ADOXG
ADRFC
ADTPH
ADURQ
ADYFF
ADYOE
ADZKW
AEBTG
AEEQQ
AEFIE
AEFTE
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AENEX
AEOHA
AEPYU
AESKC
AESTI
AETLH
AEVLU
AEVTX
AEXYK
AEYWE
AFEXP
AFGCZ
AFKRA
AFLOW
AFNRJ
AFQWF
AFWTZ
AFYQB
AFZKB
AGAYW
AGDGC
AGGBP
AGGDS
AGJBK
AGMZJ
AGQMX
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIIXL
AILAN
AIMYW
AITGF
AJBLW
AJDOV
AJRNO
AJZVZ
AKQUC
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMTXH
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
AZQEC
B-.
BA0
BBWZM
BDATZ
BENPR
BEZIV
BGLVJ
BGNMA
BPHCQ
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
DWQXO
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ6
GQ7
GQ8
GROUPED_ABI_INFORM_COMPLETE
GUQSH
GXS
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I09
IHE
IJ-
IKXTQ
ITG
ITH
ITM
IWAJR
IXC
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K60
K6V
K6~
K7-
KDC
KOV
KOW
LAK
LLZTM
M0C
M0N
M2O
M4Y
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P2P
P62
P9O
PF0
PQBIZ
PQQKQ
PROAC
PT4
PT5
Q2X
QOK
QOS
R4E
R89
R9I
RHV
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TH9
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UNUBA
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z5O
Z7R
Z7S
Z7V
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z86
Z88
Z8M
Z8N
Z8P
Z8Q
Z8R
Z8S
Z8T
Z8U
Z8W
Z92
ZMTXR
~EX
AACDK
AAEOY
AAJBT
AASML
AAYXX
ABAKF
ACAOD
ACDTI
ACZOJ
AEFQL
AEMSY
AFBBN
AGQEE
AGRTI
AIGIU
CITATION
H13
PQBZA
7SC
7XB
8AL
8FD
8FK
JQ2
L.-
L7M
L~C
L~D
MBDVC
PQEST
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-c319t-aec48c47c25a14e1db77ba62bc43f421b315de9ca789b53b7228d54359423ea73
IEDL.DBID 8FG
ISSN 1380-7501
IngestDate Thu Oct 10 19:03:56 EDT 2024
Thu Sep 12 19:19:29 EDT 2024
Sat Dec 16 12:08:18 EST 2023
IsPeerReviewed true
IsScholarly true
Issue 9
Keywords Android security
Lazy learning
Malware detection
Multimodal fusion
Case-based reasoning
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-aec48c47c25a14e1db77ba62bc43f421b315de9ca789b53b7228d54359423ea73
PQID 2649846541
PQPubID 54626
PageCount 15
ParticipantIDs proquest_journals_2649846541
crossref_primary_10_1007_s11042_021_10749_8
springer_journals_10_1007_s11042_021_10749_8
PublicationCentury 2000
PublicationDate 2022-04-01
PublicationDateYYYYMMDD 2022-04-01
PublicationDate_xml – month: 04
  year: 2022
  text: 2022-04-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
– name: Dordrecht
PublicationSubtitle An International Journal
PublicationTitle Multimedia tools and applications
PublicationTitleAbbrev Multimed Tools Appl
PublicationYear 2022
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References CR19
CR17
CR39
CR16
CR15
Zarni Aung (CR38) 2013; 2
Yen, Sun (CR37) 2019; 93
CR35
CR12
CR34
Jeong, Kim, Lee (CR11) 2017; 76
CR33
CR31
CR30
Wu, Du, Fu (CR36) 2014; 52
Kim, Kang, Rho, Sezer, Im (CR14) 2018; 14
Niu, Cao, Zhang, Ding, Zhang, Li (CR28) 2020; 20
Maiorca, Ariu, Corona, Aresu, Giacinto (CR25) 2015; 51
CR2
Bakour, Ünver (CR6) 2020; 33
CR4
Pan, Ge, Fang, Fan (CR29) 2020; 8
CR3
Souri, Hosseini (CR32) 2018; 8
Gibert, Mateu, Planes (CR10) 2020; 95
CR5
CR8
CR7
Lee, Chen, Li, Shie (CR21) 2020; 143
CR27
Adebayo, Abdul Aziz (CR1) 2019; 2019
CR26
CR24
CR23
CR20
CR41
CR40
Gandotra, Bansal, Sofat (CR9) 2017; 48
Karbab, Debbabi, Derhab, Mouheb (CR13) 2020; 97
Li, Sun, Yan, Li, Srisa-An, Ye (CR22) 2018; 14
Kumar, Zhang, Wang, Khan, Kumar, Sharif (CR18) 2019; 7
WZ Zarni Aung (10749_CR38) 2013; 2
OS Adebayo (10749_CR1) 2019; 2019
A Souri (10749_CR32) 2018; 8
E Gandotra (10749_CR9) 2017; 48
10749_CR41
EB Karbab (10749_CR13) 2020; 97
10749_CR20
J Li (10749_CR22) 2018; 14
W Niu (10749_CR28) 2020; 20
D Maiorca (10749_CR25) 2015; 51
10749_CR40
T Kim (10749_CR14) 2018; 14
10749_CR27
10749_CR26
10749_CR23
10749_CR24
D Gibert (10749_CR10) 2020; 95
K Bakour (10749_CR6) 2020; 33
R Kumar (10749_CR18) 2019; 7
ES Jeong (10749_CR11) 2017; 76
10749_CR30
10749_CR31
Y Pan (10749_CR29) 2020; 8
Y-S Yen (10749_CR37) 2019; 93
10749_CR4
10749_CR16
10749_CR3
10749_CR17
10749_CR39
10749_CR2
10749_CR15
10749_CR8
10749_CR12
10749_CR34
L Wu (10749_CR36) 2014; 52
10749_CR7
C-H Lee (10749_CR21) 2020; 143
10749_CR35
10749_CR5
10749_CR33
10749_CR19
References_xml – volume: 14
  start-page: 773
  issue: 3
  year: 2018
  end-page: 788
  ident: CR14
  article-title: A multimodal deep learning method for android malware detection using various features
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2018.2866319
  contributor:
    fullname: Im
– volume: 8
  start-page: 116363
  year: 2020
  end-page: 116379
  ident: CR29
  article-title: A systematic literature review of android malware detection using static analysis
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3002842
  contributor:
    fullname: Fan
– volume: 97
  start-page: 101965
  year: 2020
  ident: CR13
  article-title: Scalable and robust unsupervised android malware fingerprinting using community-based network partitioning
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2020.101965
  contributor:
    fullname: Mouheb
– ident: CR4
– ident: CR39
– ident: CR2
– ident: CR16
– ident: CR12
– ident: CR30
– ident: CR33
– ident: CR35
– ident: CR8
– ident: CR40
– ident: CR27
– ident: CR23
– volume: 20
  start-page: 3645
  issue: 13
  year: 2020
  ident: CR28
  article-title: Opcode-level function call graph based android malware classification using deep learning
  publication-title: Sensors
  doi: 10.3390/s20133645
  contributor:
    fullname: Li
– volume: 95
  start-page: 101873
  year: 2020
  ident: CR10
  article-title: Hydra: A multimodal deep learning framework for malware classification
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2020.101873
  contributor:
    fullname: Planes
– volume: 93
  start-page: 109
  year: 2019
  end-page: 114
  ident: CR37
  article-title: An android mutation malware detection based on deep learning using visualization of importance from codes
  publication-title: Microelectron Reliab
  doi: 10.1016/j.microrel.2019.01.007
  contributor:
    fullname: Sun
– ident: CR19
– volume: 143
  start-page: 113062
  year: 2020
  ident: CR21
  article-title: Customized and knowledge-centric service design model integrating case-based reasoning and triz
  publication-title: Expert Syst Appl
  doi: 10.1016/j.eswa.2019.113062
  contributor:
    fullname: Shie
– ident: CR3
– ident: CR15
– ident: CR17
– ident: CR31
– volume: 51
  start-page: 16
  year: 2015
  end-page: 31
  ident: CR25
  article-title: Stealth attacks: An extended insight into the obfuscation effects on android malware
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2015.02.007
  contributor:
    fullname: Giacinto
– volume: 33
  start-page: 1
  year: 2020
  end-page: 21
  ident: CR6
  article-title: Visdroid: Android malware classification based on local and global image features, bag of visual words and machine learning techniques
  publication-title: Neural Comput & Applic
  contributor:
    fullname: Ünver
– volume: 14
  start-page: 3216
  issue: 7
  year: 2018
  end-page: 3225
  ident: CR22
  article-title: Significant permission identification for machine-learning-based android malware detection
  publication-title: IEEE Transactions on Industrial Informatics
  doi: 10.1109/TII.2017.2789219
  contributor:
    fullname: Ye
– volume: 2019
  start-page: 2850932:1
  year: 2019
  end-page: 2850932:13
  ident: CR1
  article-title: Improved malware detection model with apriori association rule and particle swarm optimization
  publication-title: Secur Commun Networks
  contributor:
    fullname: Abdul Aziz
– volume: 8
  start-page: 3
  issue: 1
  year: 2018
  ident: CR32
  article-title: A state-of-the-art survey of malware detection approaches using data mining techniques
  publication-title: Human-centric Computing and Information Sciences
  doi: 10.1186/s13673-018-0125-x
  contributor:
    fullname: Hosseini
– ident: CR34
– ident: CR5
– ident: CR7
– volume: 7
  start-page: 64411
  year: 2019
  end-page: 64430
  ident: CR18
  article-title: A multimodal malware detection technique for android iot devices using various features
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2916886
  contributor:
    fullname: Sharif
– volume: 2
  start-page: 228
  issue: 3
  year: 2013
  end-page: 234
  ident: CR38
  article-title: Permission-based android malware detection
  publication-title: International Journal of Scientific & Technology Research
  contributor:
    fullname: Zarni Aung
– ident: CR41
– ident: CR26
– volume: 48
  start-page: 29
  issue: 1
  year: 2017
  end-page: 48
  ident: CR9
  article-title: Malware threat assessment using fuzzy logic paradigm
  publication-title: Cybern Syst
  doi: 10.1080/01969722.2016.1262704
  contributor:
    fullname: Sofat
– ident: CR24
– volume: 52
  start-page: 80
  issue: 3
  year: 2014
  end-page: 87
  ident: CR36
  article-title: Security threats to mobile multimedia applications: Camera-based attacks on mobile phones
  publication-title: IEEE Commun Mag
  doi: 10.1109/MCOM.2014.6766089
  contributor:
    fullname: Fu
– ident: CR20
– volume: 76
  start-page: 18153
  issue: 17
  year: 2017
  end-page: 18173
  ident: CR11
  article-title: Safeguard: a behavior based real-time malware detection scheme for mobile multimedia applications in android platform
  publication-title: Mult. Tools App.
  doi: 10.1007/s11042-016-4189-1
  contributor:
    fullname: Lee
– ident: 10749_CR35
  doi: 10.1145/3384544.3384546
– ident: 10749_CR34
  doi: 10.1145/2480362.2480701
– ident: 10749_CR26
  doi: 10.1109/ICCNC.2019.8685502
– ident: 10749_CR33
  doi: 10.1109/EUC.2018.00010
– volume: 7
  start-page: 64411
  year: 2019
  ident: 10749_CR18
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2916886
  contributor:
    fullname: R Kumar
– ident: 10749_CR5
  doi: 10.1109/ACCESS.2020.3033026
– volume: 8
  start-page: 3
  issue: 1
  year: 2018
  ident: 10749_CR32
  publication-title: Human-centric Computing and Information Sciences
  doi: 10.1186/s13673-018-0125-x
  contributor:
    fullname: A Souri
– ident: 10749_CR12
  doi: 10.1007/978-3-030-44041-1_117
– ident: 10749_CR16
  doi: 10.1109/MSR.2015.79
– ident: 10749_CR7
– volume: 143
  start-page: 113062
  year: 2020
  ident: 10749_CR21
  publication-title: Expert Syst Appl
  doi: 10.1016/j.eswa.2019.113062
  contributor:
    fullname: C-H Lee
– volume: 76
  start-page: 18153
  issue: 17
  year: 2017
  ident: 10749_CR11
  publication-title: Mult. Tools App.
  doi: 10.1007/s11042-016-4189-1
  contributor:
    fullname: ES Jeong
– ident: 10749_CR23
– ident: 10749_CR30
  doi: 10.1155/2019/7198435
– volume: 33
  start-page: 1
  year: 2020
  ident: 10749_CR6
  publication-title: Neural Comput & Applic
  contributor:
    fullname: K Bakour
– volume: 48
  start-page: 29
  issue: 1
  year: 2017
  ident: 10749_CR9
  publication-title: Cybern Syst
  doi: 10.1080/01969722.2016.1262704
  contributor:
    fullname: E Gandotra
– ident: 10749_CR17
  doi: 10.1109/ISCO.2016.7726949
– volume: 20
  start-page: 3645
  issue: 13
  year: 2020
  ident: 10749_CR28
  publication-title: Sensors
  doi: 10.3390/s20133645
  contributor:
    fullname: W Niu
– volume: 97
  start-page: 101965
  year: 2020
  ident: 10749_CR13
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2020.101965
  contributor:
    fullname: EB Karbab
– ident: 10749_CR19
  doi: 10.1007/s40745-020-00265-1
– volume: 14
  start-page: 3216
  issue: 7
  year: 2018
  ident: 10749_CR22
  publication-title: IEEE Transactions on Industrial Informatics
  doi: 10.1109/TII.2017.2789219
  contributor:
    fullname: J Li
– volume: 95
  start-page: 101873
  year: 2020
  ident: 10749_CR10
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2020.101873
  contributor:
    fullname: D Gibert
– ident: 10749_CR4
  doi: 10.1007/978-3-319-12060-7_20
– volume: 93
  start-page: 109
  year: 2019
  ident: 10749_CR37
  publication-title: Microelectron Reliab
  doi: 10.1016/j.microrel.2019.01.007
  contributor:
    fullname: Y-S Yen
– ident: 10749_CR31
  doi: 10.1109/ICOSEC49089.2020.9215355
– volume: 8
  start-page: 116363
  year: 2020
  ident: 10749_CR29
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3002842
  contributor:
    fullname: Y Pan
– ident: 10749_CR40
  doi: 10.1145/3345768.3355915
– volume: 2019
  start-page: 2850932:1
  year: 2019
  ident: 10749_CR1
  publication-title: Secur Commun Networks
  contributor:
    fullname: OS Adebayo
– volume: 14
  start-page: 773
  issue: 3
  year: 2018
  ident: 10749_CR14
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2018.2866319
  contributor:
    fullname: T Kim
– ident: 10749_CR15
– ident: 10749_CR20
  doi: 10.1109/CCST.2018.8585560
– ident: 10749_CR24
  doi: 10.2991/icmeit-19.2019.60
– volume: 51
  start-page: 16
  year: 2015
  ident: 10749_CR25
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2015.02.007
  contributor:
    fullname: D Maiorca
– ident: 10749_CR41
  doi: 10.1109/WCNC45663.2020.9120748
– ident: 10749_CR2
  doi: 10.1145/2901739.2903508
– volume: 52
  start-page: 80
  issue: 3
  year: 2014
  ident: 10749_CR36
  publication-title: IEEE Commun Mag
  doi: 10.1109/MCOM.2014.6766089
  contributor:
    fullname: L Wu
– ident: 10749_CR39
  doi: 10.1109/SP.2012.16
– ident: 10749_CR27
  doi: 10.1145/3374664.3375746
– ident: 10749_CR8
  doi: 10.7494/csci.2019.20.3.3285
– ident: 10749_CR3
  doi: 10.14722/ndss.2014.23247
– volume: 2
  start-page: 228
  issue: 3
  year: 2013
  ident: 10749_CR38
  publication-title: International Journal of Scientific & Technology Research
  contributor:
    fullname: WZ Zarni Aung
SSID ssj0016524
Score 2.406546
Snippet Android has a large number of users that are accumulating with each passing day. Security of the Android ecosystem is a major concern for these users with the...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Publisher
StartPage 12077
SubjectTerms 1177: Advances in Deep Learning for Multimodal Fusion and Alignment
Computer Communication Networks
Computer Science
Data integration
Data Structures and Information Theory
Malware
Multimedia Information Systems
Special Purpose and Application-Based Systems
SummonAdditionalLinks – databaseName: SpringerLINK - Czech Republic Consortium
  dbid: AGYKE
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwED5BWWDgjSgU5IENUtWOnThjhYAKBCytBFPkVypESVFJheDXY6cO4Tl0ypD4pPjufCf5-74DOGKKhIlSJNASZwFNOLXnIJFBx_CYhxmnWceRk69vot6AXt6xu5rHXYLdqxvJ8qCuuW7YMUkcosBhCJOAL8ISc4JfDVjqXtxfnX1eHkTMz7LlncAWROy5Mn9b-V6P6ibzx71oWW7O16BfkXZmKJPH9rSQbfX-W8Nxnj9Zh1XffqLuLF42YMHkm7BWjXZAPtM3YeWLTuEW3JY03aextku90qrzJ8qmL-VjPEHCCR88aPQkRq9iYpA2RQnyypFD1g_RSLy_IT-iYrgNg_Oz_mkv8JMYAmVTtAiEUZQrGivCBKYGaxnHUkREKhpmlGAZYqZNokTME8lCGRPCNbOdWGK7NSPicAca-Tg3u4CEtFGjM0EyLGgUSsk6IrGWWBQrHmLdhOPKH-nzTHAjraWV3c6ldufScudS3oRW5bLUJ99Lans8G3NuwHkTTioX1K__t7Y33-f7sEwcGaLE8bSgUUym5sC2KIU89CH5ASK33DE
  priority: 102
  providerName: Springer Nature
Title Multimodal information fusion for android malware detection using lazy learning
URI https://link.springer.com/article/10.1007/s11042-021-10749-8
https://www.proquest.com/docview/2649846541
Volume 81
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LSwMxEB7UXvTgW6xWycGbBptssps9SZU-UHwgFuppyWtF0Fb7QPTXm2yzVgU9BXbZOczsPMjMNx_AAdc0SrWm2CiSY5YK5uIgVbhuRSKiXLC87sHJl1dxp8vOe7wXLtxGYayyjIlFoDYD7e_Ij13idoI8a_XJyyv2rFG-uxooNOahQvwmPI8Ub7W_uggxD6S2oo5dZiQBNDOFzhEPTPEDCn4kMcXiZ2KaVZu_GqRF3mmtwnIoGFFjauE1mLP9dVgpyRhQ8M11WPq2WXADrgtg7fPAuE_DblRvAZRPRsUxGCLpVxU8GvQsn97k0CJjx8VYVh_5WfgH9CQ_3lEglXjYhG6reXfWwYE7AWvnVGMsrWZCs0RTLgmzxKgkUTKmSrMoZ5SoiHBjUy0TkSoeqYRSYbirnVJXX1mZRFuw0B_07TYgqZydTS5pTiSLI6V4XaZOEo8TLSJiqnBYKi57ma7IyGbLkL2aM6fmrFBzJqpQK3WbBXcZZTPjVuGo1Pfs9d_Sdv6XtguL1MMVikmbGiyMhxO754qIsdov_pR9qDTa9xdNd542r25u3dMubXwCMNzHaw
link.rule.ids 315,786,790,12792,21416,27955,27956,33406,33777,41114,41556,42183,42625,43633,43838,52144,52267,74390,74657
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV25TgMxEB1xFEDBEUCE0wUdWMTXrrdCCBHCkdAEiW7laxESJJAEIfh67I2XABJUW1g7xYznkOfNPIB9YSjLjKHYalJgnknu4yDVuOFkKlkhedEIw8ntTtK65Zd34i4-uA0jrLKKiWWgtn0T3siPfOL2ggJr9fHzCw6sUaG7Gik0pmGWs4SFey6b519dhEREUlvZwD4zkjg0Mx6dI2EwJQAUAiQxw_JnYppUm78apGXeaS7DYiwY0cnYwisw5Xo1WKrIGFD0zRosfNssuAo35WDtU9_6X-Nu1GABVLwOy09_gFRYVfBg0ZN6fFMDh6wblbCsHgpY-Hv0qD7eUSSVuF-D2-ZZ97SFI3cCNt6pRlg5w6XhqaFCEe6I1WmqVUK14azglGhGhHWZUanMtGA6pVRa4WunzNdXTqVsHWZ6_Z7bAKS0t7MtFC2I4gnTWjRU5iWJJDWSEVuHg0px-fN4RUY-WYYc1Jx7NeelmnNZh-1Kt3l0l2E-MW4dDit9T47_lrb5v7Q9mGt129f59UXnagvmaRhdKFE32zAzGry6HV9QjPRueWs-AYAWxjw
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3JTsMwEB2xSAgOLAVEoYAP3MCiduzEOSEElLIVDlTiFnlLhQQtdBGCr8dOHQpIcMohyhxmPDNP8Zt5AHtc0yjVmmKjSI5ZKpirg1ThuhWJiHLB8rofTr5pxc02u3zgD4H_NAi0yrImFoXa9LT_R37oGrcz5FWrD_NAi7g7bRy9vGKvIOVvWoOcxjTMepDtZRxE4_zrRiHmQeBW1LHrkiQM0IzH6IgfUvFkBU9PTLH42aQmyPPXZWnRgxrLsBjAIzoeR3sFpmy3AkulMAMKeVqBhW9bBlfhthiyfe4Z92nYk-qjgfLRoHj0-kj6tQWPBj3LpzfZt8jYYUHR6iLPi--gJ_nxjoLARGcN2o2z-5MmDjoKWLsEG2JpNROaJZpySZglRiWJkjFVmkU5o0RFhBubapmIVPFIJZQKwx2OSh3WsjKJ1mGm2-vaDUBSuZibXNKcSBZHSvG6TJ0lHidaRMRUYb90XPYyXpeRTRYjezdnzs1Z4eZMVKFW-jYLqTPIJoGuwkHp78nrv61t_m9tF-bcgcmuL1pXWzBP_RRDQcCpwcywP7LbDlsM1U5xaD4BxoXKcQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Multimodal+information+fusion+for+android+malware+detection+using+lazy+learning&rft.jtitle=Multimedia+tools+and+applications&rft.au=Qaisar%2C+Zahid+Hussain&rft.au=Li%2C+Ruixuan&rft.date=2022-04-01&rft.issn=1380-7501&rft.eissn=1573-7721&rft.volume=81&rft.issue=9&rft.spage=12077&rft.epage=12091&rft_id=info:doi/10.1007%2Fs11042-021-10749-8&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s11042_021_10749_8
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1380-7501&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1380-7501&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1380-7501&client=summon