{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:36:40Z","timestamp":1743035800059,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030200046"},{"type":"electronic","value":"9783030200053"}],"license":[{"start":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T00:00:00Z","timestamp":1556409600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-20005-3_13","type":"book-chapter","created":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T09:04:21Z","timestamp":1556355861000},"page":"124-131","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Neuro-Evolutionary Feature Selection to Detect Android Malware"],"prefix":"10.1007","author":[{"given":"Silvia","family":"Gonz\u00e1lez","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2444-5384","authenticated-orcid":false,"given":"\u00c1lvaro","family":"Herrero","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Sedano","sequence":"additional","affiliation":[]},{"given":"Emilio","family":"Corchado","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,28]]},"reference":[{"key":"13_CR1","unstructured":"Global smartphone sales to end users from 1st quarter 2009. \n                    https:\/\/www.statista.com\/statistics\/266219\/global-smartphone-sales-since-1st-quarter-2009-by-operating-system\/"},{"key":"13_CR2","unstructured":"Yajin, Z., Xuxian, J.: Dissecting android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy, pp. 95\u2013109 (2012)"},{"key":"13_CR3","unstructured":"Apache Spark. \n                    https:\/\/spark.apache.org\/"},{"key":"13_CR4","first-page":"1157","volume":"3","author":"I Guyon","year":"2003","unstructured":"Guyon, I., Elisseeff, A.: An introduction to variable and feature selection. J. Mach. Learn. Res. 3, 1157\u20131182 (2003)","journal-title":"J. Mach. Learn. Res."},{"issue":"1","key":"13_CR5","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1093\/bib\/bbk007","volume":"7","author":"P Larra\u00f1aga","year":"2006","unstructured":"Larra\u00f1aga, P., Calvo, B., Santana, R., Bielza, C., Galdiano, J., Inza, I., Lozano, J.A., Arma\u00f1anzas, R., Santaf\u00e9, G., P\u00e9rez, A.: Machine learning in bioinformatics. Brief. Bioinform. 7(1), 86\u2013112 (2006)","journal-title":"Brief. Bioinform."},{"issue":"02","key":"13_CR6","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1142\/S0219720005001004","volume":"3","author":"C Ding","year":"2005","unstructured":"Ding, C., Peng, H.: Minimum redundancy feature selection from microarray gene expression data. J. Bioinform. Comput. Biol. 3(02), 185\u2013205 (2005)","journal-title":"J. Bioinform. Comput. Biol."},{"issue":"1","key":"13_CR7","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.jbi.2009.08.010","volume":"43","author":"H Liu","year":"2010","unstructured":"Liu, H., Liu, L., Zhang, H.: Ensemble gene selection by grouping for microarray data classification. J. Biomed. Inform. 43(1), 81\u201387 (2010)","journal-title":"J. Biomed. Inform."},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Spreitzenbarth, M., Echtler, F., Schreck, T., Freling, F.C., Hoffmann, J.: Mobile-sandbox: having a deeper look into android applications. In: 28th International ACM Symposium on Applied Computing (SAC) (2013)","DOI":"10.1145\/2480362.2480701"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K.: DREBIN: effective and explainable detection of android malware in your pocket. In: 21st Annual Network and Distributed System Security Symposium (2014)","DOI":"10.14722\/ndss.2014.23247"},{"issue":"6\u20137","key":"13_CR10","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1080\/01969722.2013.803903","volume":"44","author":"R S\u00e1nchez","year":"2013","unstructured":"S\u00e1nchez, R., Herrero, \u00c1., Corchado, E.: Visualization and clustering for SNMP intrusion detection. Cybern. Syst. Int. J. 44(6\u20137), 505\u2013532 (2013)","journal-title":"Cybern. Syst. Int. J."},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Pinz\u00f3n, C., Herrero, \u00c1., De Paz, J.F., Corchado, E., Bajo, J.: CBRid4SQL: a CBR intrusion detector for SQL injection attacks, pp. 510\u2013519. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-13803-4_63"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Corchado, E., Herrero, \u00c1., Baruque, B., S\u00e1iz, J.M.: Intrusion detection system based on a cooperative topology preserving method. In: Ribeiro, B., Albrecht, R.F., Dobnikar, A., Pearson, D.W., Steele, N.C. (eds.) International Conference on Adaptive and Natural Computing Algorithms (ICANNGA 2005), pp. 454\u2013457. Springer, Vienna (2005)","DOI":"10.1007\/3-211-27389-1_109"},{"key":"13_CR13","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.diin.2015.02.001","volume":"13","author":"A Feizollah","year":"2015","unstructured":"Feizollah, A., Anuar, N.B., Salleh, R., Wahab, A.W.A.: A review on feature selection in mobile malware detection. Digit. Investig. 13, 22\u201337 (2015)","journal-title":"Digit. Investig."},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Hyo-Sik, H., Mi-Jung, C.: Analysis of android malware detection performance using machine learning classifiers. In: 2013 International Conference on ICT Convergence, pp. 490\u2013495 (2013)","DOI":"10.1109\/ICTC.2013.6675404"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Shabtai, A., Elovici, Y.: Applying behavioral detection on android-based devices. In: Cai, Y., Magedanz, T., Li, M., Xia, J., Giannelli, C. (eds.) Mobile Wireless Middleware, Operating Systems, and Applications: Third International Conference, Mobilware 2010, Chicago, IL, USA, 30 June\u20132 July 2010, Revised Selected Papers, pp. 235\u2013249. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-17758-3_17"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Shabtai, A., Fledel, Y., Elovici, Y.: Automated static code analysis for classifying android applications using machine learning. In: 2010 International Conference on Computational Intelligence and Security, pp. 329\u2013333 (2010)","DOI":"10.1109\/CIS.2010.77"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Battista, P., Mercaldo, F., Nardone, V., Santone, A., Visaggio, C.: Identification of android malware families with model checking. In: 2nd International Conference on Information Systems Security and Privacy (2016)","DOI":"10.5220\/0005809205420547"},{"issue":"1","key":"13_CR18","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1093\/jigpal\/jzw046","volume":"25","author":"J Sedano","year":"2017","unstructured":"Sedano, J., Gonz\u00e1lez, S., Chira, C., Herrero, A., Corchado, E., Villar, J.R.: Key features for the characterization of android malware families. Logic J. IGPL 25(1), 54\u201366 (2017)","journal-title":"Logic J. IGPL"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"John, G.H., Kohavi, R., Pfleger, K.: Irrelevant features and the subset selection problem. In: 11th International Conference on Machine Learning, pp. 121\u2013129. Morgan Kauffman, San Francisco (1994)","DOI":"10.1016\/B978-1-55860-335-6.50023-4"},{"issue":"1\u20132","key":"13_CR20","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/S0004-3702(97)00043-X","volume":"97","author":"R Kohavi","year":"1997","unstructured":"Kohavi, R., John, G.H.: Wrappers for feature subset selection. Artif. Intell. 97(1\u20132), 273\u2013324 (1997)","journal-title":"Artif. Intell."},{"key":"13_CR21","volume-title":"Genetic Algorithms in Search, Optimization, and Machine Learning","author":"DE Goldberg","year":"1989","unstructured":"Goldberg, D.E.: Genetic Algorithms in Search, Optimization, and Machine Learning. Addison-Wesley, Reading (1989)"},{"issue":"5","key":"13_CR22","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1016\/0167-8655(89)90037-8","volume":"10","author":"W Siedlecki","year":"1989","unstructured":"Siedlecki, W., Sklansky, J.: A note on genetic algorithms for large-scale feature selection. Pattern Recogn. Lett. 10(5), 335\u2013347 (1989)","journal-title":"Pattern Recogn. Lett."},{"key":"13_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-52156-5","volume-title":"Genetic Algorithm Essentials","author":"O Kramer","year":"2017","unstructured":"Kramer, O.: Genetic Algorithm Essentials. Springer, Cham (2017)"},{"key":"13_CR24","unstructured":"Pal, S.K., Mitra, S.: Multilayer perceptron, fuzzy sets, and classification (2011)"},{"issue":"3","key":"13_CR25","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1093\/imamat\/12.3.223","volume":"12","author":"CG Broyden","year":"1973","unstructured":"Broyden, C.G., Dennis Jr., J.E., Mor\u00e9, J.J.: On the local and superlinear convergence of Quasi-Newton methods. IMA J. Appl. Math. 12(3), 223\u2013245 (1973)","journal-title":"IMA J. Appl. Math."},{"key":"13_CR26","unstructured":"Virus Total. \n                    https:\/\/www.virustotal.com"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-20005-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T04:07:09Z","timestamp":1558152429000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-20005-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,28]]},"ISBN":["9783030200046","9783030200053"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-20005-3_13","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,4,28]]},"assertion":[{"value":"28 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Computational Intelligence in Security for Information Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seville","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 May 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 May 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisis2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2019.cisisconference.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}