{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T12:31:28Z","timestamp":1726057888024},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030325909"},{"type":"electronic","value":"9783030325916"}],"license":[{"start":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T00:00:00Z","timestamp":1573084800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-32591-6_24","type":"book-chapter","created":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T13:03:30Z","timestamp":1573045410000},"page":"221-228","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Dynamic Detection of Malicious Code on Android Based on Improved Multi-feature Gaussian Kernel"],"prefix":"10.1007","author":[{"given":"Qing","family":"Yu","sequence":"first","affiliation":[]},{"given":"Xixi","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Zuohua","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,7]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Lindorfer, M., Neugschwandtner, M., Weichselbaum, L., Fratantonio, Y., Van Der Veen, V., Platzer, C.: Andrubis-1 000000 apps later: a view on current Android malware behaviors. In: Proceedings of the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS) (2014)","DOI":"10.1109\/BADGERS.2014.7"},{"key":"24_CR2","unstructured":"DroidBox: Android application sandbox (2011). \n                    https:\/\/code.google.com\/"},{"key":"24_CR3","unstructured":"Enck, W., Gilbert, P., Chun, B., Cox, L., Jung, J., McDaniel, P., Sheth, A.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, pp. 1\u20136. USENIX Association (2010)"},{"key":"24_CR4","unstructured":"Steven, A., Siegfried, R., Christian, F., Eric, B.: Flow-droid: precise context flow field object-sensitive and lifecycle-aware taint analysis for Android apps. In: Proceedings of the 35th International Conference on Security (2014)"},{"key":"24_CR5","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-319-04283-1_6","volume-title":"Security and Privacy in Communication Networks","author":"Y Aafer","year":"2013","unstructured":"Aafer, Y., Du, W., Yin, H.: DroidAPIMiner: mining API-level features for robust malware detection in Android. In: Zia, T., Zomaya, A., Varadharajan, V., Mao, M. (eds.) Security and Privacy in Communication Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 127, pp. 86\u2013103. Springer, Cham (2013)"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Wu, D.J., Mao, C.H., Wei, T.E., Lee, H.M., Wu, K.P.: DroidMat: Android malware detection through manifest and API calls tracing. In: 2012 Seventh Asia Joint Conference on Information Security (Asia JCIS), Tokyo, pp. 62\u201369. IEEE (2012)","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Schmidt, A.-D., et al.: Detecting Symbian OS malware through static function call analysis. In: 2009 4th International Conference on Malicious and Unwanted Software (MAL-WARE). IEEE (2009)","DOI":"10.1109\/MALWARE.2009.5403024"},{"key":"24_CR8","unstructured":"Liu, J., Wu, H., Wang, H.: A detection method for malicious codes in Android apps. In: 10th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2014), Beijing, vol. 8, no. 2, pp. 514\u2013519 (2014)"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Jeong, J., Seo, D., Milburn, J.: MysteryChecker: unpredictable attestation to detect repackaged malicious applications in Android. In: 2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE), Fajardo, PR, vol. 10, no. 3, pp. 50\u201357 (2014)","DOI":"10.1109\/MALWARE.2014.6999415"},{"issue":"1","key":"24_CR10","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/s11416-014-0226-7","volume":"11","author":"VM Afonso","year":"2015","unstructured":"Afonso, V.M., Amorim, M.F.D., Gr\u00e9gio, A.R.A., et al.: Identifying Android malware using dynamically obtained features. J. Comput. Virol. Hacking Tech. 11(1), 9\u201317 (2015)","journal-title":"J. Comput. Virol. Hacking Tech."},{"issue":"39","key":"24_CR11","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.cose.2013.08.010","volume":"39","author":"YD Lin","year":"2013","unstructured":"Lin, Y.D., Lai, Y.C., Chen, C.H., et al.: Identifying Android malicious repackaged applications by thread-grained system call sequences. Comput. Secur. 39(39), 340\u2013350 (2013)","journal-title":"Comput. Secur."},{"issue":"11","key":"24_CR12","doi-asserted-by":"publisher","first-page":"1869","DOI":"10.1109\/TIFS.2014.2353996","volume":"9","author":"W Wang","year":"2014","unstructured":"Wang, W., Wang, X., Feng, D., et al.: Exploring permission-induced risk in Android applications for malicious application detection. IEEE Trans. Inf. Forensics Secur. 9(11), 1869\u20131882 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"24_CR13","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1002\/ett.3016","volume":"27","author":"X Xiao","year":"2016","unstructured":"Xiao, X., Xiao, X., Jiang, Y., et al.: Identifying Android malware with system call co-occurrence matrices. Trans. Emerg. Telecommun. Technol. 27(5), 675\u2013684 (2016)","journal-title":"Trans. Emerg. Telecommun. Technol."}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32591-6_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T13:13:32Z","timestamp":1573046012000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32591-6_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,7]]},"ISBN":["9783030325909","9783030325916"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32591-6_24","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,11,7]]},"assertion":[{"value":"7 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICNC-FSKD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kunming","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icncfskd2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}