Skip to main content

Table 4 Timeline of the reviewed papers

From: On building machine learning pipelines for Android malware detection: a procedural survey of practices, challenges and opportunities

2011 Burguera et al. (2011)
2012 Sahs and Khan (2012)
Wu et al. (2012)
Dini et al. (2012)
2013 Aafer et al. (2013)
Yerima (2013)
Peiravian and Zhu (2013)
Gascon et al. (2013)
Sanz et al. (2013)
Zarni Aung (2013)
Amos et al. (2013)
2014 Arp et al. (2014)
Liu and Liu (2014)
Wang et al. (2014)
Wu and Hung (2014)
Yerima et al. (2014)
Yuan et al. (2014)
Zhang et al. (2014)
Yang et al. (2014)
Shabtai et al. (2014)
2015 Yerima et al. (2015)
Lindorfer et al. (2015)
2016 Yuan et al. (2016)
Wang et al. (2016)
2017 McLaughlin et al. (2017)
Milosevic et al. (2017)
Tong and Yan (2017)
Suarez-Tangil et al. (2017)
2018 Feng et al. (2018)
Karbab et al. (2018)
Li et al. (2018)
Xu et al. (2018)
Zhang et al. (2018)
Zhu et al. (2018)
Saracino et al. (2018)
2019 Demontis et al. (2019)
Kim et al. (2019)
Cai et al. (2018)
2020 Alzaylaee et al. (2020)
Taheri et al. (2020)
2021 Bakour and Ünver (2021)
Casolare et al. (2021)