{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:14:21Z","timestamp":1742915661680,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030042110"},{"type":"electronic","value":"9783030042127"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-04212-7_43","type":"book-chapter","created":{"date-parts":[[2018,11,16]],"date-time":"2018-11-16T12:01:33Z","timestamp":1542369693000},"page":"486-498","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Mobile Malware Detection - An Analysis of the Impact of Feature Categories"],"prefix":"10.1007","author":[{"given":"Mahbub E.","family":"Khoda","sequence":"first","affiliation":[]},{"given":"Joarder","family":"Kamruzzaman","sequence":"additional","affiliation":[]},{"given":"Iqbal","family":"Gondal","sequence":"additional","affiliation":[]},{"given":"Tasadduq","family":"Imam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,17]]},"reference":[{"key":"43_CR1","unstructured":"Number of Smartphone Users Worldwide. https:\/\/www.statista.com\/statistics\/330695\/number-of-smartphone-users-worldwide\/. Accessed 16 Nov 2017"},{"key":"43_CR2","unstructured":"Number of Android Devices. https:\/\/www.macrumors.com\/2017\/05\/17\/2-billion-active-android-devices\/. Accessed 16 Nov 2017"},{"key":"43_CR3","doi-asserted-by":"crossref","unstructured":"Alzaylaee, M.K., Yerima, S.Y., Sezer, S.: Emulator vs real phone: android malware detection using machine learning. In: Proceedings of the 3rd ACM on International Workshop on Security and Privacy Analytics, pp. 65\u201372. ACM (2017)","DOI":"10.1145\/3041008.3041010"},{"key":"43_CR4","doi-asserted-by":"crossref","unstructured":"Yang, C., Zhang, J., Gu, G.: Understanding the market-level and network-level behaviors of the android malware ecosystem. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 2452\u20132457. IEEE (2017)","DOI":"10.1109\/ICDCS.2017.297"},{"key":"43_CR5","doi-asserted-by":"crossref","unstructured":"Samra, A.A.A., Yim, K., Ghanem, O.A.: Analysis of clustering technique in android malware detection. In: 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 729\u2013733. IEEE (2013)","DOI":"10.1109\/IMIS.2013.111"},{"key":"43_CR6","doi-asserted-by":"publisher","unstructured":"Frank, M., Dong, B., Felt, A.P., Song, D.: Mining permission request patterns from android and Facebook applications, pp. 870\u2013875, December 2012. https:\/\/doi.org\/10.1109\/ICDM.2012.86","DOI":"10.1109\/ICDM.2012.86"},{"issue":"1","key":"43_CR7","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1049\/iet-ifs.2013.0095","volume":"8","author":"SY Yerima","year":"2014","unstructured":"Yerima, S.Y., Sezer, S., McWilliams, G.: Analysis of bayesian classification-based approaches for android malware detection. IET Inf. Secur. 8(1), 25\u201336 (2014)","journal-title":"IET Inf. Secur."},{"key":"43_CR8","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 95\u2013109. IEEE (2012)","DOI":"10.1109\/SP.2012.16"},{"key":"43_CR9","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., Siemens, C.: DREBIN: effective and explainable detection of android malware in your pocket. In: Ndss, vol. 14, pp. 23\u201326 (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"43_CR10","doi-asserted-by":"crossref","unstructured":"Yang, W., Xiao, X., Andow, B., Li, S., Xie, T., Enck, W.: Appcontext: differentiating malicious and benign mobile app behaviors using context. In: Proceedings of the 37th International Conference on Software Engineering, ICSE 2015, vol. 1, pp. 303\u2013313. IEEE Press, Piscataway (2015). http:\/\/dl.acm.org\/citation.cfm?id=2818754.2818793","DOI":"10.1109\/ICSE.2015.50"},{"key":"43_CR11","unstructured":"Narayanan, A., Chandramohan, M., Chen, L., Liu, Y.: Context-aware, adaptive and scalable android malware detection through online learning (extended version). CoRR abs\/1706.00947 (2017). http:\/\/arxiv.org\/abs\/1706.00947"},{"issue":"3","key":"43_CR12","doi-asserted-by":"publisher","first-page":"1222","DOI":"10.1007\/s10664-017-9539-8","volume":"23","author":"Annamalai Narayanan","year":"2017","unstructured":"Narayanan, A., Chandramohan, M., Chen, L., Liu, Y.: A multi-view context-aware approach to android malware detection and malicious code localization. Empir. Softw. Eng. (2017). https:\/\/doi.org\/10.1007\/s10664-017-9539-8","journal-title":"Empirical Software Engineering"},{"issue":"6","key":"43_CR13","doi-asserted-by":"publisher","first-page":"1252","DOI":"10.1109\/TIFS.2016.2523912","volume":"11","author":"K Xu","year":"2016","unstructured":"Xu, K., Li, Y., Deng, R.H.: ICCDetector: ICC-based malware detection on android. IEEE Trans. Inf. Forensics Secur. 11(6), 1252\u20131264 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"43_CR14","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.cose.2016.11.007","volume":"65","author":"A Feizollah","year":"2017","unstructured":"Feizollah, A., Anuar, N.B., Salleh, R., Suarez-Tangil, G., Furnell, S.: Androdialysis: analysis of android intent effectiveness in malware detection. Comput. Secur. 65, 121\u2013134 (2017)","journal-title":"Comput. Secur."},{"issue":"1","key":"43_CR15","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/s11416-014-0226-7","volume":"11","author":"VM Afonso","year":"2015","unstructured":"Afonso, V.M., de Amorim, M.F., Gr\u00e9gio, A.R.A., Junquera, G.B., de Geus, P.L.: Identifying android malware using dynamically obtained features. J. Comput. Virol. Hacking Tech. 11(1), 9\u201317 (2015)","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"43_CR16","doi-asserted-by":"crossref","unstructured":"Dimja\u0161evi\u0107, M., Atzeni, S., Ugrina, I., Rakamaric, Z.: Evaluation of android malware detection based on system calls. In: Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, pp. 1\u20138. ACM (2016)","DOI":"10.1145\/2875475.2875487"},{"key":"43_CR17","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.jpdc.2016.10.012","volume":"103","author":"F Tong","year":"2017","unstructured":"Tong, F., Yan, Z.: A hybrid approach of mobile malware detection in android. J. Parallel Distrib. Comput. 103, 22\u201331 (2017)","journal-title":"J. Parallel Distrib. Comput."},{"key":"43_CR18","doi-asserted-by":"crossref","unstructured":"Yuan, Z., Lu, Y., Wang, Z., Xue, Y.: Droid-sec: deep learning in android malware detection. In: ACM SIGCOMM Computer Communication Review, vol. 44, pp. 371\u2013372. ACM (2014)","DOI":"10.1145\/2740070.2631434"},{"issue":"6","key":"43_CR19","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1145\/2666356.2594299","volume":"49","author":"S Arzt","year":"2014","unstructured":"Arzt, S., et al.: Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. ACM Sigplan Not. 49(6), 259\u2013269 (2014)","journal-title":"ACM Sigplan Not."},{"key":"43_CR20","doi-asserted-by":"crossref","unstructured":"Su, X., Zhang, D., Li, W., Zhao, K.: A deep learning approach to android malware feature learning and detection. In: Trustcom\/BigDataSE\/I SPA, pp. 244\u2013251. IEEE (2016)","DOI":"10.1109\/TrustCom.2016.0070"},{"key":"43_CR21","doi-asserted-by":"crossref","unstructured":"Au, K.W.Y., Zhou, Y.F., Huang, Z., Lie, D.: Pscout: analyzing the android permission specification. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 217\u2013228. ACM (2012)","DOI":"10.1145\/2382196.2382222"},{"key":"43_CR22","unstructured":"Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers Inc., San Francisco (1993)"}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-04212-7_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T17:10:32Z","timestamp":1710263432000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-04212-7_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030042110","9783030042127"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-04212-7_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"17 November 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICONIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Neural Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Siem Reap","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cambodia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconip2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conference.cs.cityu.edu.hk\/iconip\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"575","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"401","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"70% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}