{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:46:20Z","timestamp":1759333580624},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030017002"},{"type":"electronic","value":"9783030017019"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01701-9_14","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T12:03:08Z","timestamp":1545998588000},"page":"248-263","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Lexical Mining of Malicious URLs for Classifying Android Malware"],"prefix":"10.1007","author":[{"given":"Shanshan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Qiben","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Zhenxiang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Riccardo","family":"Spolaor","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"14_CR1","unstructured":"Security threat report 2014. http:\/\/www.sophos.com\/en-us\/medialibrary\/PDFs\/other\/sophossecurity-threat-report-2014.pdf"},{"issue":"3","key":"14_CR2","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/s10115-011-0410-8","volume":"31","author":"L Wang","year":"2012","unstructured":"Wang, L., et al.: Improvement of neural network classifier using floating centroids. Knowl. Inf. Syst. 31(3), 433\u2013454 (2012)","journal-title":"Knowl. Inf. Syst."},{"key":"14_CR3","unstructured":"Specification of malicious url 2013. http:\/\/www.antiy.net\/p\/specification-of-malicious-url"},{"key":"14_CR4","unstructured":"Canopy clustering algorithm. https:\/\/en.wikipedia.org\/wiki\/Canopy_clustering_algorithm"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Wu, D.J., Mao, C.H., Lee, H.M., Wu, K.P.: Droidmat: android malware detection through manifest and api calls tracing. In: Information Security, pp. 62\u201369 (2012)","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K.: DREBIN: effective and explainable detection of android malware in your pocket. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-319-11203-9_10","volume-title":"Computer Security - ESORICS 2014","author":"C Yang","year":"2014","unstructured":"Yang, C., Xu, Z., Gu, G., Yegneswaran, V., Porras, P.: DroidMiner: automated mining and characterization of fine-grained malicious behaviors in android applications. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 163\u2013182. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11203-9_10"},{"key":"14_CR8","unstructured":"Yan, L.K., Yin, H.: DroidScope: seamlessly reconstructing the OS and Dalvik semantic views for dynamic android malware analysis. In: Proceedings of the 21st USENIX Conference on Security Symposium, p. 29 (2013)"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Rastogi, V., Chen, Y., Enck, W.: AppsPlayground: automatic security analysis of smartphone applications. In: ACM Conference on Data and Application Security and Privacy, pp. 209\u2013220 (2013)","DOI":"10.1145\/2435349.2435379"},{"issue":"1","key":"14_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00500-014-1511-6","volume":"20","author":"FA Narudin","year":"2016","unstructured":"Narudin, F.A., Feizollah, A., Anuar, N.B., Gani, A.: Evaluation of machine learning classifiers for mobile malware detection. Soft Comput. 20(1), 1\u201315 (2016)","journal-title":"Soft Comput."},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Xu, Q., et al.: Automatic generation of mobile app signatures from traffic observations. In: Computer Communications, pp. 1481\u20131489 (2015)","DOI":"10.1109\/INFOCOM.2015.7218526"},{"key":"14_CR12","unstructured":"Wang, S., Chen, Z., Zhang, L., Yan, Q., Yang, B.: Trafficav: an effective and explainable detection of mobile malware behavior using network traffic. In: Proceedings of IEEE\/ACM International Symposium on Quality of Service (IWQOS), pp. 1\u20136 (2016)"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Pizzato, L., Rej, T., Chung, T., Koprinska, I., Kay, J.: RECON: a reciprocal recommender for online dating. In: ACM Conference on Recommender Systems, pp. 207\u2013214 (2010)","DOI":"10.1145\/1864708.1864747"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Wei, X., Neamtiu, I., Faloutsos, M.: Whom does your android app talk to? In: Global Communications Conference (GLOBECOM), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/GLOCOM.2015.7416952"},{"issue":"6","key":"14_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2014.02.009","volume":"43","author":"A Shabtai","year":"2014","unstructured":"Shabtai, A., Tenenboim-Chekina, L., Mimran, D., Rokach, L., Shapira, B., Elovici, Y.: Mobile malware detection through analysis of deviations in application network behavior. Comput. Secur. 43(6), 1\u201318 (2014)","journal-title":"Comput. Secur."},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Gorla, A., Tavecchia, I., Gross, F., Zeller, A.: Checking app behavior against app descriptions. In: Proceedings of the 36th International Conference on Software Engineering, pp. 1025\u20131035. ACM (2014)","DOI":"10.1145\/2568225.2568276"},{"key":"14_CR17","unstructured":"Android monkey tool. http:\/\/developer.android.com\/tools\/help\/monkey.html"},{"key":"14_CR18","unstructured":"Tshark - dump and analyze network traffic. https:\/\/www.wireshark.org\/docs\/man-pages\/tshark.html"},{"key":"14_CR19","unstructured":"Yang, Y., Pedersen, J.O.: A comparative study on feature selection in text categorization. In: Fourteenth International Conference on Machine Learning, pp. 412\u2013420 (1997)"},{"key":"14_CR20","unstructured":"PSO tutorial. http:\/\/www.swarmintelligence.org\/tutorials.php"},{"key":"14_CR21","unstructured":"Virusshare.com - because sharing is caring. https:\/\/virusshare.com\/"},{"key":"14_CR22","unstructured":"Virustotal. https:\/\/www.virustotal.com\/"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Aranganayagi, S., Thangavel, K.: Clustering categorical data using silhouette coefficient as a relocating measure. In: Conference on Computational Intelligence and Multimedia Applications. International Conference on, vol. 2, pp. 13\u201317. IEEE (2007)","DOI":"10.1109\/ICCIMA.2007.328"},{"key":"14_CR24","unstructured":"Perdisci, R., Lee, W., Feamster, N.: Behavioral clustering of HTTP-based malware and signature generation using malicious network traces. In: Usenix Conference on Networked Systems Design and Implementation, p. 26 (2010)"},{"issue":"99","key":"14_CR25","first-page":"1","volume":"PP","author":"S Wang","year":"2017","unstructured":"Wang, S., Yan, Q., Chen, Z., Yang, B., Zhao, C., Conti, M.: Detecting android malware leveraging text semantics of network flows. IEEE Trans. Inf. Forensics Secur. PP(99), 1 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01701-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T01:16:42Z","timestamp":1573607802000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01701-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017002","9783030017019"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01701-9_14","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}