{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:17:19Z","timestamp":1726003039241},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030050627"},{"type":"electronic","value":"9783030050634"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05063-4_31","type":"book-chapter","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T00:23:45Z","timestamp":1544142225000},"page":"399-414","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Android Malware Detection Using Category-Based Permission Vectors"],"prefix":"10.1007","author":[{"given":"Xu","family":"Li","sequence":"first","affiliation":[]},{"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Saqib","family":"Ali","sequence":"additional","affiliation":[]},{"given":"QiLin","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"key":"31_CR1","unstructured":"Google: Android Security 2017 Year in Review (2018)"},{"key":"31_CR2","unstructured":"Statista: Cumulative Number of Apps Downloaded from the Google Play as of May 2016. https:\/\/www.statista.com\/statistics\/281106\/number-of-android-app-downloads-from-google-play\/ . Accessed 20 June 2018"},{"key":"31_CR3","unstructured":"Qihoo 360: Mobile Security Report. http:\/\/bbs.360.cn\/thread-14972358-1-1.html . Accessed 20 June 2018"},{"key":"31_CR4","unstructured":"Kaspersky Labs: Mobile Malware Evolution (2017). https:\/\/securelist.com\/mobile-Malware-review-2017\/84139\/ . Accessed 20 June 2018"},{"key":"31_CR5","unstructured":"Symantec: Latest Intelligence for March 2016. In: Symantec Official Blog (2016)"},{"key":"31_CR6","volume-title":"Android Hacker\u2019s Handbook","author":"J Drake","year":"2014","unstructured":"Drake, J., Lanier, Z., Mulliner, C., et al.: Android Hacker\u2019s Handbook. Wiley, Hoboken (2014)"},{"key":"31_CR7","doi-asserted-by":"publisher","first-page":"998","DOI":"10.1109\/COMST.2014.2386139","volume":"17","author":"P Faruki","year":"2015","unstructured":"Faruki, P., et al.: Android security: a survey of issues, malware penetration, and defenses. IEEE Commun. Surv. Tutors. 17, 998\u20131022 (2015)","journal-title":"IEEE Commun. Surv. Tutors."},{"key":"31_CR8","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.dss.2016.09.006","volume":"93","author":"K Sokolova","year":"2017","unstructured":"Sokolova, K., Perez, C., Lemercier, M.: Android application classification and anomaly detection with graph-based permission patterns. Decis. Support Syst. 93, 62\u201376 (2017)","journal-title":"Decis. Support Syst."},{"issue":"7","key":"31_CR9","doi-asserted-by":"publisher","first-page":"3216","DOI":"10.1109\/TII.2017.2789219","volume":"14","author":"J Li","year":"2018","unstructured":"Li, J., Sun, L., Yan, Q., Li, Z., Srisa-an, W., Ye, H.: Android malware detection. IEEE Trans. Ind. Inform. 14(7), 3216\u20133225 (2018)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Felt, A., Chin, E., Hanna, S.: Android permissions demystified. In: Proceedings of 18th ACM Conference on Computer and Communications Security - CCS 2011, pp. 627\u2013636 (2011)","DOI":"10.1145\/2046707.2046779"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Peng, H., et al.: Using probabilistic generative models for ranking risks of Android apps. In: Proceedings of 2012 ACM Conference on Computer and Communications Security - CCS 2012, p. 241 (2012)","DOI":"10.1145\/2382196.2382224"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: Proceedings of 16th ACM Computer and Communications Security. - CCS 2009, p. 235 (2009)","DOI":"10.1145\/1653662.1653691"},{"key":"31_CR13","doi-asserted-by":"publisher","first-page":"1772","DOI":"10.1109\/TIFS.2017.2687880","volume":"12","author":"M Fan","year":"2017","unstructured":"Fan, M., Liu, J., Wang, W., Li, H., Tian, Z., Liu, T.: DAPASA: detecting android piggybacked apps through sensitive subgraph analysis. IEEE Trans. Inf. Forensics Secur. 12, 1772\u20131785 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Grace, M., Zhou, Y., Zhang, Q., Zou, S., Jiang, X.: RiskRanker: scalable and accurate zero-day android malware detection. In: 10th International Conference on Mobile Systems, Applications, and Services, pp. 281\u2013294 (2012)","DOI":"10.1145\/2307636.2307663"},{"key":"31_CR15","unstructured":"Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. In: Proceedings of 19th Annual Network and Distributed System Security Symposium, pp. 5\u20138 (2012)"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Hao, H., Singh, V., Du, W.: On the effectiveness of API-level access control using bytecode rewriting in Android. In: Proceedings of 8th ACM SIGSAC Symposium on Information, Computer and Communications Security - ASIA CCS 2013, p. 25 (2013)","DOI":"10.1145\/2484313.2484317"},{"key":"31_CR17","doi-asserted-by":"publisher","first-page":"1255","DOI":"10.1109\/TII.2015.2482921","volume":"11","author":"K Bu","year":"2015","unstructured":"Bu, K., Xu, M., Liu, X., Luo, J., Zhang, S., Weng, M.: Deterministic detection of cloning attacks for anonymous RFID systems. IEEE Trans. Ind. Inform. 11, 1255\u20131266 (2015)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"31_CR18","first-page":"1","volume":"1","author":"T Cruz","year":"2016","unstructured":"Cruz, T., et al.: A cybersecurity detection framework for supervisory control and data acquisition systems. IEEE Trans. Ind. Inform. 1, 1\u201310 (2016)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"31_CR19","unstructured":"G. Android: Requesting permissions. https:\/\/developer.android.google.cn\/guide\/topics\/permissions\/overview#normal-dangerous"},{"key":"31_CR20","doi-asserted-by":"publisher","first-page":"1869","DOI":"10.1109\/TIFS.2014.2353996","volume":"9","author":"W Wang","year":"2014","unstructured":"Wang, W., Wang, X., Feng, D., Liu, J., Han, Z., Zhang, X.: Exploring permission-induced risk in android applications for malicious application detection. IEEE Trans. Inf. Forensics Secur. 9, 1869\u20131882 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"31_CR21","doi-asserted-by":"crossref","unstructured":"Xu, W., Zhang, F., Zhu, S.: Permlyzer: analyzing permission usage in Android applications. In: 2013 IEEE 24th International Symposium on Software Reliability Engineering, ISSRE 2013, pp. 400\u2013410 (2013)","DOI":"10.1109\/ISSRE.2013.6698893"},{"key":"31_CR22","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., H\u00fcbner, M., Gascon, H., Rieck, K.: Drebin: effective and explainable detection of android malware in your pocket. In: Proceedings of 2014 Network and Distributed System Security Symposium (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"31_CR23","unstructured":"Google Play Homepage. https:\/\/play.google.com\/store . Accessed 19 June 2018"},{"key":"31_CR24","unstructured":"Huawei App Store Homepage. http:\/\/appstore.huawei.com\/soft\/list . Accessed 20 June 2018"},{"key":"31_CR25","unstructured":"Xiao MI App Store Homepage. http:\/\/app.mi.com\/ . Accessed 20 June 2018"},{"key":"31_CR26","unstructured":"Application Details Query Interface. http:\/\/code.google.com\/p\/android-market-api\/ . Accessed 19 May 2018"},{"key":"31_CR27","unstructured":"Malicious App Sharing Site. https:\/\/virusshare.com\/ . Accessed 20 June 2018"},{"key":"31_CR28","unstructured":"Application Analyzing Tool. http:\/\/code.google.com\/p\/androguard\/ . Accessed 25 Apr 2018"},{"key":"31_CR29","unstructured":"Android Malicious Application Sharing. https:\/\/contagiominidump.blogspot.com\/ . Accessed 20 June 2018"},{"key":"31_CR30","doi-asserted-by":"crossref","unstructured":"Ali, S., Wang, G., Cottrell, R.L., Anwar, T.: Detecting anomalies from end-to-end internet performance measurements (PingER) using cluster based local outlier factor. In: 2017 IEEE ISPA\/IUCC, pp. 982\u2013989 (2017)","DOI":"10.1109\/ISPA\/IUCC.2017.00150"},{"key":"31_CR31","unstructured":"Fuchs, A.P., Chaudhuri, A., Foster, J.: SCanDroid\u202f: automated security certification of android applications. Read, vol. 10, p. 328 (2010)"},{"key":"31_CR32","doi-asserted-by":"crossref","unstructured":"Ali, S., Wang, G., Xing, X., Cottrell, R.L.: Substituting missing values in end-to-end internet performance measurements using k-nearest neighbors. In: 2018 IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, 16th International Conference on Pervasive Intelligence and Computing, 4th International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech), pp. 919\u2013926. IEEE, August 2018","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.000-8"},{"key":"31_CR33","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1109\/TPAMI.1979.4766909","volume":"PAMI-1","author":"DL Davies","year":"1979","unstructured":"Davies, D.L., Bouldin, D.W.: A cluster separation measure. IEEE Trans. Pattern Anal. Mach. Intell. PAMI-1, 224\u2013227 (1979)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"31_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-78650-6","volume-title":"The Uncertainty in Physical Measurements","author":"Paolo Fornasini","year":"2008","unstructured":"Fornasini, P.: The Uncertainty in Physical Measurements (2008)"},{"key":"31_CR35","doi-asserted-by":"crossref","unstructured":"Ali, S., Wang, G., Cottrell, R.L., Masood, S.: Internet performance analysis of South Asian countries using end-to-end internet performance measurements. In: 2017 IEEE ISPA\/IUCC, pp. 1319\u20131326 (2017)","DOI":"10.1109\/ISPA\/IUCC.2017.00201"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05063-4_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T23:18:28Z","timestamp":1573082308000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05063-4_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030050627","9783030050634"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05063-4_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ica3pp2018\/authors.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"407","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"141","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"50","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"7.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}