Skip to main content

Table 4 Timeline of the reviewed papers

From: On building machine learning pipelines for Android malware detection: a procedural survey of practices, challenges and opportunities

2011

Burguera et al. (2011)

2012

Sahs and Khan (2012)

Wu et al. (2012)

Dini et al. (2012)

2013

Aafer et al. (2013)

Yerima (2013)

Peiravian and Zhu (2013)

Gascon et al. (2013)

Sanz et al. (2013)

Zarni Aung (2013)

Amos et al. (2013)

2014

Arp et al. (2014)

Liu and Liu (2014)

Wang et al. (2014)

Wu and Hung (2014)

Yerima et al. (2014)

Yuan et al. (2014)

Zhang et al. (2014)

Yang et al. (2014)

Shabtai et al. (2014)

2015

Yerima et al. (2015)

Lindorfer et al. (2015)

2016

Yuan et al. (2016)

Wang et al. (2016)

2017

McLaughlin et al. (2017)

Milosevic et al. (2017)

Tong and Yan (2017)

Suarez-Tangil et al. (2017)

2018

Feng et al. (2018)

Karbab et al. (2018)

Li et al. (2018)

Xu et al. (2018)

Zhang et al. (2018)

Zhu et al. (2018)

Saracino et al. (2018)

2019

Demontis et al. (2019)

Kim et al. (2019)

Cai et al. (2018)

2020

Alzaylaee et al. (2020)

Taheri et al. (2020)

2021

Bakour and Ünver (2021)

Casolare et al. (2021)