{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T09:44:38Z","timestamp":1774950278281,"version":"3.50.1"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030708658","type":"print"},{"value":"9783030708665","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-70866-5_4","type":"book-chapter","created":{"date-parts":[[2021,3,2]],"date-time":"2021-03-02T16:03:57Z","timestamp":1614701037000},"page":"57-72","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Improving Android Malware Detection Through Dimensionality Reduction Techniques"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4233-5998","authenticated-orcid":false,"given":"Vasileios","family":"Kouliaridis","sequence":"first","affiliation":[]},{"given":"Nektaria","family":"Potha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6348-5031","authenticated-orcid":false,"given":"Georgios","family":"Kambourakis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,3]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Papamartzivanos, D., Damopoulos, D., Kambourakis, G.: A cloud-based architecture to crowdsource mobile app privacy leaks. In: Proceedings of the 18th Panhellenic Conference on Informatics, PCI 2014, pp. 1\u20136. Association for Computing Machinery, New York, NY, USA (2014)","DOI":"10.1145\/2645791.2645799"},{"key":"4_CR2","doi-asserted-by":"publisher","unstructured":"Damopoulos, D., Kambourakis, G., Gritzalis, S., Park, S.O.: Exposing mobile malware from the inside (or what is your mobile app really doing?). Peer Peer Netw. Appl. 7(4), 687\u2013697 (2014). https:\/\/doi.org\/10.1007\/s12083-012-0179-x. https:\/\/doi.org\/10.1007\/s12083-012-0179-x","DOI":"10.1007\/s12083-012-0179-x"},{"key":"4_CR3","doi-asserted-by":"publisher","unstructured":"Damopoulos, D., Kambourakis, G., Anagnostopoulos, M., Gritzalis, S., Park, J.H.: User privacy and modern mobile services: are they on the same path? Pers. Ubiquitous Comput. 17(7), 1437\u20131448 (2013) https:\/\/doi.org\/10.1007\/s00779-012-0579-1. https:\/\/doi.org\/10.1007\/s00779-012-0579-1","DOI":"10.1007\/s00779-012-0579-1"},{"key":"4_CR4","unstructured":"Mobile OS market share (2020). https:\/\/gs.statcounter.com\/os-market-share\/mobile\/worldwide. Accessed 10 Sep 2020"},{"key":"4_CR5","unstructured":"Smartphone market share (2020). https:\/\/www.idc.com\/promo\/smartphone-market-share\/os. Accessed 10 Sep 2020"},{"key":"4_CR6","unstructured":"Mcafee mobile threat report 2020 (2020). https:\/\/www.mcafee.com\/content\/dam\/consumer\/en-us\/docs\/2020-Mobile-Threat-Report.pdf. Accessed 10 Sep 2020"},{"key":"4_CR7","unstructured":"Contagio. http:\/\/contagiominidump.blogspot.com\/. Accessed 10 Sep 2020"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: Proceedings of the 33rd IEEE Symposium on Security and Privacy, vol. 12, no. 7 (2012)","DOI":"10.1109\/SP.2012.16"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Huebner, M., Gascon, H., Rieck, K.: Drebin: efficient and explainable detection of android malware in your pocket. In: 21th Annual Network and Distributed System Security Symposium (NDSS), vol. 12, no. (7), p. 1128 (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"4_CR10","unstructured":"Author. Details withheld to preserve blind review. anonymized"},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1007\/s11219-017-9368-4","volume":"26","author":"P Yan","year":"2018","unstructured":"Yan, P., Yan, Z.: A survey on dynamic mobile malware detection. Software Qual. J. 26, 891\u2013919 (2018)","journal-title":"Software Qual. J."},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1186\/s13673-018-0125-x","volume":"8","author":"A Souri","year":"2018","unstructured":"Souri, A., Hosseini, R.: A state-of-the-art survey of malware detection approaches using data mining technique. Hum.-Centric Comput. Inf. Sci. 8, 3 (2018)","journal-title":"Hum.-Centric Comput. Inf. Sci."},{"key":"4_CR13","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/978-3-030-01535-0_19","volume-title":"Applied Informatics","author":"M Odusami","year":"2018","unstructured":"Odusami, M., Abayomi-Alli, O., Misra, S., Shobayo, O., Damasevicius, R., Maskeliunas, R.: Android malware detection: a survey. In: Florez, H., Diaz, C., Chavarriaga, J. (eds.) ICAI 2018. CCIS, vol. 942, pp. 255\u2013266. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01535-0_19"},{"key":"4_CR14","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s00500-014-1511-6","volume":"20","author":"FA Narudin","year":"2016","unstructured":"Narudin, F.A., Feizollah, A., Anuar, N.B., Gani, A.: Evaluation of machine learning classifiers for mobile malware detection. Soft. Comput. 20, 343\u2013357 (2016)","journal-title":"Soft. Comput."},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Allix, K., Bissyand\u00e9 F, T., Klein, J., Le Traon, Y.: Androzoo: collecting millions of android apps for the research community. In: Proceedings of the 13th International Conference on Mining Software Repositories, MSR 2016, pp. 468\u2013471. ACM (2016)","DOI":"10.1145\/2901739.2903508"},{"key":"4_CR16","unstructured":"Author. Details withheld to preserve blind review"},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.cose.2017.11.006","volume":"73","author":"I Ali-Gombe","year":"2018","unstructured":"Ali-Gombe, I., Saltaformaggio, B., Ramanujam, J.R., Xu, D., Richard, G.G.: Toward a more dependable hybrid analysis of android malware using aspect-oriented programming. Comput. Secur. 73, 235\u2013248 (2018)","journal-title":"Comput. Secur."},{"key":"4_CR18","doi-asserted-by":"publisher","first-page":"4321","DOI":"10.1109\/ACCESS.2018.2792941","volume":"6","author":"S Arshad","year":"2018","unstructured":"Arshad, S., Shah, M.A., Wahid, A., Mehmood, A., Song, H., Samadroid, H.Y.: A novel 3-level hybrid malware detection model for android operating system. IEEE Access 6, 4321\u20134339 (2018)","journal-title":"IEEE Access"},{"key":"4_CR19","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1007\/978-3-319-56991-8_51","volume-title":"Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016","author":"L Xu","year":"2018","unstructured":"Xu, L., Zhang, D., Jayasena, N., Cavazos, J.: HADM: hybrid analysis for detection of malware. In: Bi, Y., Kapoor, S., Bhatia, R. (eds.) IntelliSys 2016. LNNS, vol. 16, pp. 702\u2013724. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-56991-8_51"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Fang, Q., Yang, X., Ji, C.: A hybrid detection method for android malware. In: 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), pp. 2127\u20132132 (2019)","DOI":"10.1109\/ITNEC.2019.8729017"},{"issue":"7","key":"4_CR21","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.3390\/sym12071128","volume":"12","author":"V Kouliaridis","year":"2020","unstructured":"Kouliaridis, V., Kambourakis, G., Geneiatakis, D., Potha, N.: Two anatomists are better than one-dual-level android malware detection. Symmetry 12(7), 1128 (2020)","journal-title":"Symmetry"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Martinelli, F., Mercaldo, F., Saracino, A.: BrideMaid: an hybrid tool for accurate detection of android malware. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (2017)","DOI":"10.1145\/3052973.3055156"},{"key":"4_CR23","first-page":"102483","volume":"54","author":"R Surendran","year":"2020","unstructured":"Surendran, R., Thomas, T., Emmanuel, S.: SamaDroid: a tan based hybrid model for android malware detection. J. Inf. Secur. Appl. 54, 102483 (2020)","journal-title":"J. Inf. Secur. Appl."},{"issue":"2","key":"4_CR24","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1093\/jigpal\/jzy030","volume":"27","author":"R Vega Vega","year":"2018","unstructured":"Vega Vega, R., Quinti\u00e1n, H., Calvo-Rolle, J., \u00c1lvaro, H., Corchado, E.: Gaining deep knowledge of Android malware families through dimensionality reduction techniques. Logic J. IGPL 27(2), 160\u2013176 (2018)","journal-title":"Logic J. IGPL"},{"issue":"6","key":"4_CR25","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9","volume":"41","author":"S Deerwester","year":"1990","unstructured":"Deerwester, S., Dumais, S.T., Furnas, G.W., Landauer, T.K., Harshman, R.: Indexing by latent semantic analysis. J. Am. Soc. Inf. Sci. 41(6), 391\u2013407 (1990)","journal-title":"J. Am. Soc. Inf. Sci."},{"issue":"3","key":"4_CR26","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1162\/NECO_a_00250","volume":"24","author":"K Bunte","year":"2012","unstructured":"Bunte, K., Biehl, M., Hammer, B.: A general framework for dimensionality-reducing data visualization mapping. Neural Comput. 24(3), 771\u2013804 (2012)","journal-title":"Neural Comput."},{"key":"4_CR27","unstructured":"Google play. https:\/\/play.google.com\/. Accessed 10 Sep 2020"},{"issue":"8","key":"4_CR28","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2006","unstructured":"Fawcett, T.: An introduction to ROC analysis. Pattern Recogn. Lett. 27(8), 861\u2013874 (2006)","journal-title":"Pattern Recogn. Lett."},{"key":"4_CR29","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1016\/j.compeleceng.2017.02.013","volume":"61","author":"N Milosevic","year":"2017","unstructured":"Milosevic, N., Dehghantanha, A., Choo, K.K.R.: Machine learning aided android malware classification. Comput. Electr. Eng. 61, 266\u2013274 (2017)","journal-title":"Comput. Electr. Eng."}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-70866-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,2]],"date-time":"2021-03-02T16:09:26Z","timestamp":1614701366000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-70866-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030708658","9783030708665"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-70866-5_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 March 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MLN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mln2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.adda-association.org\/mln-2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the Corona pandemic this event was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}