{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:44:16Z","timestamp":1742953456862,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030504533"},{"type":"electronic","value":"9783030504540"}],"license":[{"start":{"date-parts":[[2020,6,11]],"date-time":"2020-06-11T00:00:00Z","timestamp":1591833600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,11]],"date-time":"2020-06-11T00:00:00Z","timestamp":1591833600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-50454-0_23","type":"book-chapter","created":{"date-parts":[[2020,6,10]],"date-time":"2020-06-10T08:02:38Z","timestamp":1591776158000},"page":"244-254","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Android Malware Detection Using Multi-stage Classification Models"],"prefix":"10.1007","author":[{"given":"Md. Faiz Iqbal","family":"Faiz","sequence":"first","affiliation":[]},{"given":"Md. Anwar","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Ningrinla","family":"Marchang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,11]]},"reference":[{"key":"23_CR1","unstructured":"Statista. \nhttps:\/\/www.statista.com\/statistics\/272307\/market-share-forecast-for-smartphone-operating-systems\/"},{"key":"23_CR2","unstructured":"Bartel, A., Bissyande, T., Klein, J., Traon, Y.L., Azert, S., Li, L.: IccTA: detecting inter-component privacy leaks in android apps In: Proceedings of 37th International Conference on Software Engineering, Florence, pp. 280\u2013291. IEEE (2015)"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Chin, E., Porter, A.F., Greenwood, K., Wagner, D.: Analyzing inter-application communication in Android. In: Proceedings of the 9th International Conference on Mobile systems, Applications, and Services. ACM, pp. 239\u2013252 (2011)","DOI":"10.1145\/1999995.2000018"},{"key":"23_CR4","unstructured":"Felt, A.P., Wang, H.J., Moshchuk, A., Hanna, S., Chin, E.: Permission re-delegation: attacks and defences. In: Proceedings of the 20th USENIX Security Symposium, USENIX Association (2011)"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Octeau, D., Jha, S., Derring, M., McDaniel, P., Bartel, A., Li, L., Klein, J., Traon, Y.L.: Combining static analysis with probabilistic models to enable market-scale android inter-component analysis In: Proceedings of 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 469\u2013484. ACM (2016)","DOI":"10.1145\/2914770.2837661"},{"key":"23_CR6","unstructured":"Porter, A.F., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behaviour In: Proceedings of the 8th Symposium on Usable Privacy and Security, Article 3, pp. 1\u201314. ACM (2012)"},{"issue":"11","key":"23_CR7","doi-asserted-by":"publisher","first-page":"1869","DOI":"10.1109\/TIFS.2014.2353996","volume":"9","author":"W Wang","year":"2014","unstructured":"Wang, W., Wang, X., Feng, D., Liu, J., Han, Z., Zhang, X.: Exploring permission-induced risk in android applications for malicious application detection. IEEE Trans. Inf. Forensics Secur. 9(11), 1869\u20131882 (2014). \nhttps:\/\/doi.org\/10.1109\/TIFS.2014.2353996","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Xie, Z., Zhu, S.: Group tie: toward hidden collusion group discovery in app stores. In: Proceedings of Conference on Security and Privacy in Wireless & Mobile Networks, pp. 153\u2013164. ACM (2014)","DOI":"10.1145\/2627393.2627409"},{"key":"23_CR9","unstructured":"Intel newsroom. \nhttps:\/\/newsroom.intel.com\/news-releases\/mcafee-labs-report-reveals-new-mobile-app-collusion-threats\/"},{"key":"23_CR10","doi-asserted-by":"publisher","unstructured":"Yerima, S.Y., Sezer, S., Muttik, I.: High accuracy android malware detection using ensemble learning. IET Inf. Secur. 9(6), 313\u2013320 (2015). \nhttps:\/\/doi.org\/10.1049\/iet-ifs.2014.0099\n\n, IET Digital Library. \nhttps:\/\/digital-library.theiet.org\/content\/journals\/10.1049\/iet-ifs.2014.0099","DOI":"10.1049\/iet-ifs.2014.0099"},{"issue":"7","key":"23_CR11","doi-asserted-by":"publisher","first-page":"3216","DOI":"10.1109\/TII.2017.2789219","volume":"14","author":"J Li","year":"2018","unstructured":"Li, J., Sun, L., Yan, Q., Li, Z., Srisa-an, W., Ye, H.: Significant permission identification for machine-learning-based android malware detection. IEEE Trans. Industr. Inf. 14(7), 3216\u20133225 (2018)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"23_CR12","doi-asserted-by":"publisher","unstructured":"Arp, D., Spreitzenbarth, M., H\u00fcbner, M., Gascon, H., Rieck, K.: DREBIN: effective and explainable detection of android malware in your pocket. In: Symposium on Network and Distributed System Security (NDSS) (2014). \nhttps:\/\/doi.org\/10.14722\/ndss.2014.23247","DOI":"10.14722\/ndss.2014.23247"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Lu, Y., Kuo, C., Chen, H., Chen, C., Chou, S.: A SVM-based malware detection mechanism for android devices. In: 2018 International Conference on System Science and Engineering (ICSSE), New Taipei, pp. 1\u20136 (2018)","DOI":"10.1109\/ICSSE.2018.8520241"},{"key":"23_CR14","unstructured":"Faiz, M.F.I., Hussain, A.M., Marchang, N.: Detection of collusive app-pairs using machine learning. In: Proceedings of 3rd International Conference on Consumer Electronics ASIA, pp. 206\u2013212. IEEE (2018)"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Marforio, C., Ritzdorf, H., Francillon, A., Capkun, S.: Analysis of the communication between colluding applications on modern smartphones In: Proceedings of the 28th Annual Computer Security Applications Conference, pp. 51\u201360. ACM (2012)","DOI":"10.1145\/2420950.2420958"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Kalutarage, H.K., Nguyen, H.N., Shaikh, S.A.: Towards a threat assessment framework for apps collusion. In: Telecommunication Systems, pp. 417\u2013430. Springer (2017)","DOI":"10.1007\/s11235-017-0296-1"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Faiz, M.F.I., Hussain, M.A., Marchang, N.: App-collusion detection using a two-stage classifier. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds.) Web, Artificial Intelligence and Network Applications. WAINA 2019. Advances in Intelligent Systems and Computing, vol. 927. Springer, Cham (2019)","DOI":"10.1007\/978-3-030-15035-8_68"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Faiz, M.F.I., Hussain, A., Marchang, N.: Machine learning based app-collusion detection in smartphones. In: 2019 IEEE 23rd International Symposium on Consumer Technologies (ISCT), Ancona, Italy (2019)","DOI":"10.1109\/ISCE.2019.8901022"},{"key":"23_CR19","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1023\/A:1012487302797","volume":"46","author":"I Guyon","year":"2002","unstructured":"Guyon, I., Weston, J., Barnhill, S., Vapnik, V.: Gene selection for cancer classification using support vector machines. Mach. Learn. 46, 389\u2013422 (2002). \nhttps:\/\/doi.org\/10.1023\/A:1012487302797","journal-title":"Mach. Learn."},{"key":"23_CR20","unstructured":"Abu-Mostafa, Y.S.: Learning From Data, pp. 1\u2013213. AMLBook (2012)"},{"key":"23_CR21","unstructured":"Bishop, C.: Pattern Recognition and Machine Learning, pp. 1\u2013711. Springer-Verlag, New York (2006)"},{"issue":"2","key":"23_CR22","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1109\/TCYB.2017.2777960","volume":"49","author":"SY Yerima","year":"2019","unstructured":"Yerima, S.Y., Sezer, S.: DroidFusion: a novel multilevel classifier fusion approach for android malware detection. IEEE Trans. Cybern. 49(2), 453\u2013466 (2019)","journal-title":"IEEE Trans. Cybern."},{"key":"23_CR23","doi-asserted-by":"publisher","unstructured":"Blasco, J., Chen, T.M.: J. Comput. Virol. Hack. Tech. 14, 127 (2018). \nhttps:\/\/doi.org\/10.1007\/s11416-017-0296-4","DOI":"10.1007\/s11416-017-0296-4"},{"key":"23_CR24","doi-asserted-by":"publisher","unstructured":"Sculley, D.: Web-scale k-means clustering. In: Proceedings of the 19th International Conference on World Wide Web (WWW 2010), pp. 1177\u20131178. Association for Computing Machinery, New York (2010). \nhttps:\/\/doi.org\/10.1145\/1772690.1772862","DOI":"10.1145\/1772690.1772862"},{"key":"23_CR25","unstructured":"Gu, Q., Han, J.: Clustered support vector machines. In: Proceedings of the Sixteenth International Conference on Artificial Intelligence and Statistics, vol. 31. PMLR (2013)"},{"key":"23_CR26","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1023\/A:1018628609742","volume":"9","author":"JAK Suykens","year":"1999","unstructured":"Suykens, J.A.K., Vandewalle, J.: Least squares support vector machine classifiers. Neural Process. Lett. 9, 293\u2013300 (1999). \nhttps:\/\/doi.org\/10.1023\/A:1018628609742","journal-title":"Neural Process. Lett."},{"key":"23_CR27","doi-asserted-by":"publisher","first-page":"70319","DOI":"10.1109\/ACCESS.2019.2919185","volume":"7","author":"Y Ma","year":"2019","unstructured":"Ma, Y., Zhang, Q., Li, D., Tian, Y.: LINEX support vector machine for large-scale classification. IEEE Access 7, 70319\u201370331 (2019)","journal-title":"IEEE Access"}],"container-title":["Advances in Intelligent Systems and Computing","Complex, Intelligent and Software Intensive Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50454-0_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,10]],"date-time":"2020-06-10T08:08:33Z","timestamp":1591776513000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-50454-0_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,11]]},"ISBN":["9783030504533","9783030504540"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50454-0_23","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,6,11]]},"assertion":[{"value":"11 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on Complex, Intelligent, and Software Intensive Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lodz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"coisis2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/cisis\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}