[1] H. Alamro, W. Mtouaa, S. Aljameel, A.S. Salama, M.A. Hamza, and A.Y. Othman, "Automated android malware detection using optimal ensemble learning approach for cybersecurity," IEEE Access, 2023.
[2] R. Yumlembam, B. Issac, S.M. Jacob, and L. Yang, "Iot-based android malware detection using graph neural network with adversarial defense," IEEE Internet of Things Journal, 2022.
[3] J. Kim, Y. Ban, E. Ko, H. Cho, and J.H. Yi, "MAPAS: a practical deep learning-based android malware detection system," International Journal of Information Security, vol. 21, no. 4, pp. 725-738, 2022.
[4] R. Morshedi, S.M. Matinkhah, and M.T. Sadeghi. "Intrusion Detection for IoT Network Security with Deep learning." Journal of AI and Data Mining (2024).
[5] A. Anand, S. Rani, D. Anand, H. M. Aljahdali, and D. Kerr, "An efficient CNN-based deep learning model to detect malware attacks (CNN-DMA) in 5G-IoT healthcare applications," Sensors, vol. 21, no. 19, pp. 6346, 2021.
[6] J. Lee, H. Jang, S. Ha, and Y. Yoon, "Android malware detection using machine learning with feature selection based on the genetic algorithm," Mathematics, vol. 9, no. 21, pp. 2813, 2021.
[7] M. Yang, X. Chen, Y. Luo, and H. Zhang, "An android malware detection model based on dt-svm," Security and Communication Networks, vol. 2020, pp. 1-11, 2020.
[8] S.W. Lin, Z.J. Lee, S.C. Chen, and T.Y. Tseng, "Parameter determination of support vector machine and feature selection using simulated annealing approach," Applied soft computing, vol. 8, no. 4, pp. 1505-1512, 2008.
[9] K. Krishna and M.N. Murty, "Genetic K-means algorithm," IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol. 29, no. 3, pp. 433-439, 1999.
[10] K. Sharma and B.B. Gupta, "Mitigation and risk factor analysis of android applications," Computers & Electrical Engineering, vol. 71, pp. 416-430, 2018.
[11] D. Aboshady, N.E. Ghannam, E.K. Elsayed, and L. Diab, "APKOWL: An Automatic Approach to Enhance the Malware Detection," Mobile Networks and Applications, pp. 1-12, 2023.
[12] H.H.R. Manzil and S. Manohar Naik, "Android malware category detection using a novel feature vector-based machine learning model," Cybersecurity, vol. 6, no. 1, p. 6, 2023.
[13] C. Avci, B. Tekinerdogan, and C. Catal, "Analyzing the performance of long short‐term memory architectures for malware detection models," Concurrency and Computation: Practice and Experience, vol. 35, no. 6, pp. 1-1, 2023.
[14] V.Lavanya and P.C. Sekhar, "Efficient Cybersecurity Model Using Wavelet Deep CNN and Enhanced Rain Optimization Algorithm," International Journal of Image and Graphics, p. 2450048, 2023.
[15] J.L. Potharlanka, "Feature importance feedback with Deep Q process in ensemble-based metaheuristic feature selection algorithms," Scientific Reports, vol. 14, no. 1, p. 2923, 2024.
[16] P. K. Keserwani, M.C. Govil, and E.S. Pilli, "An effective NIDS framework based on a comprehensive survey of feature optimization and classification techniques," Neural Computing and Applications, vol. 35, no. 7, pp. 4993-5013, 2023.
[17] F. Taher, O. AlFandi, M. Al-kfairy, H. Al Hamadi, and S. Alrabaee, "DroidDetectMW: A Hybrid Intelligent Model for Android Malware Detection," Applied Sciences, vol. 13, no. 13, p. 7720, 2023.