{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:19:22Z","timestamp":1743099562376,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031175091"},{"type":"electronic","value":"9783031175107"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-17510-7_2","type":"book-chapter","created":{"date-parts":[[2022,10,12]],"date-time":"2022-10-12T04:03:06Z","timestamp":1665547386000},"page":"18-31","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["ADAM: Automatic Detection of\u00a0Android Malware"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6964-2648","authenticated-orcid":false,"given":"Somanath","family":"Tripathy","sequence":"first","affiliation":[]},{"given":"Narendra","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Divyanshu N.","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,13]]},"reference":[{"key":"2_CR1","unstructured":"The international data corporation IDC: smartphone OS market share, 2016 Q2 (2016). http:\/\/www.idc.com\/prodserv\/smartphone-os-market-share.jsp"},{"key":"2_CR2","unstructured":"Kaspersky: The number of new malicious files detected every day (2020). https:\/\/www.kaspersky.com\/about\/press-releases\/2020_the-number-of-new-malicious-files-detected-every-day-increases-by-52-to-360000-in-2020"},{"key":"2_CR3","unstructured":"Number of android apps on google play. https:\/\/www.appbrain.com\/stats\/number-of-android-apps. Accessed 30 Apr 2020"},{"issue":"1","key":"2_CR4","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/s11416-014-0226-7","volume":"11","author":"VM Afonso","year":"2015","unstructured":"Afonso, V.M., de Amorim, M.F., Gr\u00e9gio, A.R.A., Junquera, G.B., de Geus, P.L.: Identifying android malware using dynamically obtained features. J. Comput. Virol. Hacking Tech. 11(1), 9\u201317 (2015)","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Alzaylaee, M.K., Yerima, S.Y., Sezer, S.: DL-droid: deep learning based android malware detection using real devices. Comput. Secur. 89, 101663 (2020)","DOI":"10.1016\/j.cose.2019.101663"},{"issue":"8","key":"2_CR6","first-page":"22","volume":"169","author":"R Amankwah","year":"2017","unstructured":"Amankwah, R., Kudjo, P.K., Antwi, S.Y.: Evaluation of software vulnerability detection methods and tools: a review. Int. J. Comput. Appl. 169(8), 22\u20137 (2017)","journal-title":"Int. J. Comput. Appl."},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., Siemens, C.: DREBIN: effective and explainable detection of android malware in your pocket. In: Ndss, vol. 14, pp. 23\u201326 (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 15\u201326 (2011)","DOI":"10.1145\/2046614.2046619"},{"issue":"6","key":"2_CR9","doi-asserted-by":"publisher","first-page":"1455","DOI":"10.1109\/TIFS.2018.2879302","volume":"14","author":"H Cai","year":"2018","unstructured":"Cai, H., Meng, N., Ryder, B., Yao, D.: DroidCat: effective android malware detection and categorization via app-level profiling. IEEE Trans. Inf. Forensics Secur. 14(6), 1455\u20131470 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"2_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2619091","volume":"32","author":"W Enck","year":"2014","unstructured":"Enck, W., et al.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. (TOCS) 32(2), 1\u201329 (2014)","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"issue":"12","key":"2_CR11","doi-asserted-by":"publisher","first-page":"2754","DOI":"10.1109\/TMC.2018.2880731","volume":"18","author":"T Gao","year":"2018","unstructured":"Gao, T., Peng, W., Sisodia, D., Saha, T.K., Li, F., Al Hasan, M.: Android malware detection via graphlet sampling. IEEE Trans. Mob. Comput. 18(12), 2754\u20132767 (2018)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Glodek, W., Harang, R.: Rapid permissions-based detection and analysis of mobile malware using random decision forests. In: MILCOM 2013\u20132013 IEEE Military Communications Conference, pp. 980\u2013985. IEEE (2013)","DOI":"10.1109\/MILCOM.2013.170"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-030-65745-1_4","volume-title":"Network and System Security","author":"H Hui","year":"2020","unstructured":"Hui, H., Zhi, Y., Xi, N., Liu, Y.: A weighted voting framework for android app\u2019s vetting based on multiple machine learning models. In: Kuty\u0142owski, M., Zhang, J., Chen, C. (eds.) NSS 2020. LNCS, vol. 12570, pp. 63\u201378. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-65745-1_4"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Lashkari, A.H., Kadir, A.F.A., Taheri, L., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark android malware datasets and classification. In: 2018 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20137. IEEE (2018)","DOI":"10.1109\/CCST.2018.8585560"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Li, D., Wang, Z., Xue, Y.: DeepDetector: android malware detection using deep neural network. In: 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE), pp. 184\u2013188. IEEE (2018)","DOI":"10.1109\/ICACCE.2018.8441737"},{"key":"2_CR16","doi-asserted-by":"publisher","first-page":"124579","DOI":"10.1109\/ACCESS.2020.3006143","volume":"8","author":"K Liu","year":"2020","unstructured":"Liu, K., Xu, S., Xu, G., Zhang, M., Sun, D., Liu, H.: A review of android malware detection approaches based on machine learning. IEEE Access 8, 124579\u2013124607 (2020)","journal-title":"IEEE Access"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"McGiff, J., Hatcher, W.G., Nguyen, J., Yu, W., Blasch, E., Lu, C.: Towards multimodal learning for android malware detection. In: 2019 International Conference on Computing, Networking and Communications (ICNC), pp. 432\u2013436. IEEE (2019)","DOI":"10.1109\/ICCNC.2019.8685502"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Peiravian, N., Zhu, X.: Machine learning for android malware detection using permission and API calls. In: 2013 IEEE 25th International Conference on Tools with Artificial Intelligence, pp. 300\u2013305. IEEE (2013)","DOI":"10.1109\/ICTAI.2013.53"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Rahali, A., Lashkari, A.H., Kaur, G., Taheri, L., Gagnon, F., Massicotte, F.: DIDroid: android malware classification and characterization using deep image learning. In: 2020 the 10th International Conference on Communication and Network Security, pp. 70\u201382 (2020)","DOI":"10.1145\/3442520.3442522"},{"key":"2_CR20","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.ins.2011.08.020","volume":"231","author":"I Santos","year":"2013","unstructured":"Santos, I., Brezo, F., Ugarte-Pedrero, X., Bringas, P.G.: Opcode sequences as representation of executables for data-mining-based unknown malware detection. Inf. Sci. 231, 64\u201382 (2013)","journal-title":"Inf. Sci."},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Tam, K., Fattori, A., Khan, S., Cavallaro, L.: Copperdroid: automatic reconstruction of android malware behaviors. In: NDSS Symposium 2015, pp. 1\u201315 (2015)","DOI":"10.14722\/ndss.2015.23145"},{"issue":"4","key":"2_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2733306","volume":"47","author":"DJ Tan","year":"2015","unstructured":"Tan, D.J., Chua, T.W., Thing, V.L.: Securing android: a survey, taxonomy, and challenges. ACM Comput. Surv. (CSUR) 47(4), 1\u201345 (2015)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Wu, C., Shi, J., Yang, Y., Li, W.: Enhancing machine learning based malware detection model by reinforcement learning. In: Proceedings of the 8th International Conference on Communication and Network Security, pp. 74\u201378 (2018)","DOI":"10.1145\/3290480.3290494"},{"issue":"5","key":"2_CR24","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1002\/ett.3016","volume":"27","author":"X Xiao","year":"2016","unstructured":"Xiao, X., Xiao, X., Jiang, Y., Liu, X., Ye, R.: Identifying android malware with system call co-occurrence matrices. Trans. Emerg. Telecommun. Technol. 27(5), 675\u2013684 (2016)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Zhao, L., Li, D., Zheng, G., Shi, W.: Deep neural network based on android mobile malware detection system using opcode sequences. In: 2018 IEEE 18th International Conference on Communication Technology (ICCT), pp. 1141\u20131147. IEEE (2018)","DOI":"10.1109\/ICCT.2018.8600052"},{"key":"2_CR26","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-642-27503-6_22","volume-title":"Information Computing and Applications","author":"M Zhao","year":"2011","unstructured":"Zhao, M., Ge, F., Zhang, T., Yuan, Z.: AntiMalDroid: an efficient SVM-based malware detection framework for android. In: Liu, C., Chang, J., Yang, A. (eds.) ICICA 2011. CCIS, vol. 243, pp. 158\u2013166. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-27503-6_22"},{"key":"2_CR27","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1016\/j.neucom.2017.07.030","volume":"272","author":"HJ Zhu","year":"2018","unstructured":"Zhu, H.J., You, Z.H., Zhu, Z.X., Shi, W.L., Chen, X., Cheng, L.: DroidDet: effective and robust detection of android malware using static analysis along with rotation forest model. Neurocomputing 272, 638\u2013646 (2018)","journal-title":"Neurocomputing"}],"container-title":["Lecture Notes in Computer Science","Innovative Security Solutions for Information Technology and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-17510-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,23]],"date-time":"2022-12-23T12:03:27Z","timestamp":1671797007000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-17510-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031175091","9783031175107"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-17510-7_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"13 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}