{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:28:04Z","timestamp":1773840484014,"version":"3.50.1"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030360559","type":"print"},{"value":"9783030360566","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,12,5]],"date-time":"2019-12-05T00:00:00Z","timestamp":1575504000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-36056-6_11","type":"book-chapter","created":{"date-parts":[[2019,12,4]],"date-time":"2019-12-04T15:02:54Z","timestamp":1575471774000},"page":"109-120","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Android Botnet Detection by Classification Techniques"],"prefix":"10.1007","author":[{"given":"Athirah Zaffira Binti","family":"Majit","sequence":"first","affiliation":[]},{"given":"Palaniappan","family":"Shamala","sequence":"additional","affiliation":[]},{"given":"Cik Feresa Mohd","family":"Foozy","sequence":"additional","affiliation":[]},{"given":"Chuah Chai","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Muruga","family":"Chinniah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,5]]},"reference":[{"issue":"1","key":"11_CR1","first-page":"83","volume":"15","author":"A Saracino","year":"2018","unstructured":"Saracino A, Sgandurra D, Dini G, Martinelli F (2018) MADAM: effective and efficient behavior-based android malware detection and prevention 15(1):83\u201397","journal-title":"MADAM: effective and efficient behavior-based android malware detection and prevention"},{"issue":"4","key":"11_CR2","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1108\/info-02-2016-0006","volume":"18","author":"JP Simon","year":"2016","unstructured":"Simon JP (2016) How Europe missed the mobile wave. Info 18(4):12\u201332","journal-title":"Info"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Mart\u00edn I, Hern\u00e1ndez JA, Mu\u00f1oz A, Guzm\u00e1n A (2018) Android malware characterization using metadata and machine learning techniques. Secur Commun Netw (2018)","DOI":"10.1155\/2018\/5749481"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Srivastava P, Raj M (2018) Feature Extraction for enhanced malware detection using genetic algorithm 7(4):44\u201349","DOI":"10.14419\/ijet.v7i2.8.10479"},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.isprsjprs.2016.01.011","volume":"114","author":"M Belgiu","year":"2016","unstructured":"Belgiu M, Dr\u0103gu\u0163 L (2016) Random forest in remote sensing: a review of applications and future directions. ISPRS J Photogramm Remote Sens 114:24\u201331","journal-title":"ISPRS J Photogramm Remote Sens"},{"issue":"1","key":"11_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u201332","journal-title":"Mach Learn"},{"issue":"6","key":"11_CR7","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1049\/iet-ifs.2014.0099","volume":"9","author":"SY Yerima","year":"2015","unstructured":"Yerima SY, Sezer S, Muttik I (2015) High accuracy android malware detection using ensemble learning. IET Inf Secur 9(6):313\u2013320","journal-title":"IET Inf Secur"},{"key":"11_CR8","unstructured":"Aswini AM, Vinod P (2015) Towards the detection of android malware using ensemble features. J Inf Assur Secur 10(1)"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Kapratwar A (2016) Static and dynamic analysis for android malware detection","DOI":"10.5220\/0006256706530662"},{"issue":"1","key":"11_CR10","doi-asserted-by":"publisher","first-page":"1842","DOI":"10.21275\/v5i1.NOV153131","volume":"5","author":"SD Jadhav","year":"2016","unstructured":"Jadhav SD, Channe HP (2016) Comparative study of K-NN, naive Bayes and decision tree classification techniques. Int J Sci Res (IJSR) 5(1):1842\u20131845","journal-title":"Int J Sci Res (IJSR)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Singh A, Lakshmiganthan R (2017) Impact of different data types on classifier performance of random forest, naive bayes, and k-nearest neighbors algorithms","DOI":"10.14569\/IJACSA.2017.081201"},{"key":"11_CR12","first-page":"1","volume-title":"Multiple Classifier Systems","author":"Thomas G. Dietterich","year":"2000","unstructured":"Dietterich TG (2000) Ensemble methods in machine learning. In International workshop on multiple classifier systems. Springer, Berlin, Heidelberg, pp 1\u201315"},{"key":"11_CR13","unstructured":"Rao V, Hande K (2017) A comparative study of static, dynamic and hybrid analysis techniques for android malware detection 5(2):1433\u201336"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Kadir AFA, Stakhanova N, Ghorbani AA (2015) Android botnets: what urls are telling us. In: International conference on network and system security. Springer, Cham, pp 78\u201391","DOI":"10.1007\/978-3-319-25645-0_6"}],"container-title":["Advances in Intelligent Systems and Computing","Recent Advances on Soft Computing and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-36056-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,4]],"date-time":"2019-12-04T21:04:21Z","timestamp":1575493461000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-36056-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,5]]},"ISBN":["9783030360559","9783030360566"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-36056-6_11","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,5]]},"assertion":[{"value":"5 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SCDM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Soft Computing and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Langkawi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 January 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 January 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"scdm2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/scdm.uthm.edu.my\/scdm2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}