{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:14:02Z","timestamp":1742951642443,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031632143"},{"type":"electronic","value":"9783031632150"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-63215-0_14","type":"book-chapter","created":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T15:16:08Z","timestamp":1718723768000},"page":"186-200","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detecting Illicit Data Leaks on\u00a0Android Smartphones Using an\u00a0Artificial Intelligence Models"],"prefix":"10.1007","author":[{"given":"Serge Lionel","family":"Nikiema","sequence":"first","affiliation":[]},{"given":"Aminata","family":"Sabane","sequence":"additional","affiliation":[]},{"given":"Abdoul-Kader","family":"Kabore","sequence":"additional","affiliation":[]},{"given":"Rodrique","family":"Kafando","sequence":"additional","affiliation":[]},{"given":"T\u00e9gawend\u00e9 F.","family":"Bissyande","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,19]]},"reference":[{"key":"14_CR1","unstructured":"Mobile Operating System Market Share Worldwide | Statcounter Global Stats. Statcounter Global Stats. https:\/\/gs.statcounter.com\/os-market-share\/mobile\/worldwide. Accessed 14 Feb 2023"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Senanayake, J., Kalutarage, H., Al-Kadri, M.O.: Android mobile malware detection using machine learning: a systematic review. Electronics 10(13) (2021). https:\/\/doi.org\/10.3390\/electronics10131606","DOI":"10.3390\/electronics10131606"},{"key":"14_CR3","unstructured":"Hossain, M.S., Ochoa, M., Patterson, K., Boettiger, C.: Detecting and visualizing anomaly in network traffic. In: 2015 IEEE International Conference on Big Data (Big Data), pp. 1739\u20131748. IEEE (2015)"},{"key":"14_CR4","unstructured":"Eldardiry, H., Bart, E., Liu, J., Hanley, J., Price, B., Brdiczka, O.: Multi-instance multi-label learning for identifying security risks in corporate networks. In: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, pp. 135\u2013146 (2013)"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Shen, Y., Mariconti, E., Vervier, P.A., Stringhini, G.: Tiresias: predicting security events through deep learning. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 592\u2013605 (2018)","DOI":"10.1145\/3243734.3243811"},{"key":"14_CR6","unstructured":"Bon[$$u$$]klu, O., Okutan, A.: Predicting insider threat with Deep Learning. In: Proceedings of the 14th International Conference on Availability, Reliability and Security, pp. 1\u201310 (2019)"},{"key":"14_CR7","unstructured":"Almubayed, A., Hadi, A., Issa, T.B.: Detecting data exfiltration using neural networks. In: 2015 10th International Conference on Information Assurance and Security (IAS), pp. 26\u201331. IEEE (2015)"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1007\/978-3-319-70139-4_87","volume-title":"Neural Information Processing","author":"Z Li","year":"2017","unstructured":"Li, Z., Qin, Z., Huang, K., Yang, X., Ye, S.: Intrusion detection using convolutional neural networks for representation learning. In: Liu, D., Xie, S., Li, Y., Zhao, D., El-Alfy, E.-S.M. (eds.) ICONIP 2017. LNCS, vol. 10638, pp. 858\u2013866. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70139-4_87"},{"key":"14_CR9","unstructured":"Patel, K., Patel, P., Patel, H.: Malware detection using machine learning and deep learning. In: 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), pp. 563\u2013566. IEEE (2019)"},{"issue":"7","key":"14_CR10","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1016\/j.comcom.2012.01.016","volume":"35","author":"P Casas","year":"2012","unstructured":"Casas, P., Mazel, J., Owezarski, P.: Unsupervised network intrusion detection systems: detecting the unknown without knowledge. Comput. Commun. 35(7), 772\u2013783 (2012)","journal-title":"Comput. Commun."},{"issue":"5","key":"14_CR11","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MCOM.2019.1800819","volume":"57","author":"S Rezaei","year":"2019","unstructured":"Rezaei, S., Liu, X.: Deep learning for encrypted traffic classification: an overview. IEEE Commun. Mag. 57(5), 76\u201381 (2019)","journal-title":"IEEE Commun. Mag."},{"key":"14_CR12","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.jocs.2017.03.006","volume":"25","author":"S Aljawarneh","year":"2018","unstructured":"Aljawarneh, S., Aldwairi, M., Yassein, M.B.: Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J. Comput. Sci. 25, 152\u2013160 (2018)","journal-title":"J. Comput. Sci."},{"key":"14_CR13","unstructured":"Hoang, X.D., Choi, J.: A novel approach for Android malware detection using deep learning. In: 2016 18th International Conference on Advanced Communication Technology (ICACT), pp. 84\u201389. IEEE (2016)"},{"issue":"1","key":"14_CR14","doi-asserted-by":"crossref","first-page":"22","DOI":"10.3390\/sym10010022","volume":"10","author":"JH Ryu","year":"2018","unstructured":"Ryu, J.H., Baek, K., Hwang, J., Kim, P.J.: Detecting data exfiltration from the insider threat using threat tagging and nested context. Symmetry 10(1), 22 (2018)","journal-title":"Symmetry"},{"key":"14_CR15","unstructured":"Cai, H., Sanfilippo, A., Glynn, E., Rathbun, L.C.: Insider threat detection by ontology-based semantic analysis of user behavior. In: Proceedings of the First Workshop on Misinformation and Misbehavior Mining on the Web, pp. 1\u20136 (2016)"},{"key":"14_CR16","unstructured":"Popic, V., Yang, T., Vukovic, V., Desai, N., Ahamad, M.: File upload security: new attack vectors and countermeasures. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 281\u2013290 (2016)"},{"key":"14_CR17","unstructured":"\u0160ajatovi\u0107, M., Budiseli\u0107, E., Su\u0161ac, V.: A survey of honeypot deployment for detection of cyber attacks. In: 43rd International Convention on Information, Communication and Electronic Technology (MIPRO), vol. 2020, pp. 1636\u20131641. IEEE (2020)"},{"key":"14_CR18","unstructured":"Feng, X., Zheng, Z., Cai, Z., Li, D., Li, J.: Defending against new malware with shared knowledge. In: 2014 IEEE International Conference on Communications (ICC), pp. 853\u2013858. IEEE (2014)"},{"issue":"3","key":"14_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 1\u201358 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"3","key":"14_CR20","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/3236386.3241340","volume":"16","author":"ZC Lipton","year":"2018","unstructured":"Lipton, Z.C.: The mythos of model interpretability. Queue 16(3), 31\u201357 (2018)","journal-title":"Queue"},{"key":"14_CR21","unstructured":"Android Mischief Dataset. Stratosphere IPS. https:\/\/www.stratosphereips.org\/android-mischief-dataset. Accessed 29 Oct 2023"},{"key":"14_CR22","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/s10207-016-0343-z","volume":"16","author":"S Garg","year":"2017","unstructured":"Garg, S., Peddoju, S.K., Sarje, A.K.: Network-based detection of Android malicious apps. Int. J. Inf. Secur. 16, 385\u2013400 (2017)","journal-title":"Int. J. Inf. Secur."},{"key":"14_CR23","unstructured":"Sikder, A.K., Aksu, H., Uluagac, A.S.: 6thSense: a context-aware sensor-based attack detector for smart devices. In: Proceedings of the 26th USENIX Security Symposium, Vancouver, BC, Canada, pp. 397\u2013414 (2017)"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Salehi, M., Amini, M., Crispo, B.: Detecting malicious applications using system services request behavior. In: Proceedings of the 16th EAI International Conference on Mobile Ubiquitous System Computing, Networking Services, Houston, TX, USA, pp. 200\u2013209 (2019)","DOI":"10.1145\/3360774.3360805"},{"key":"14_CR25","doi-asserted-by":"publisher","first-page":"536","DOI":"10.18517\/ijaseit.10.2.10238","volume":"10","author":"R Thangavelooa","year":"2020","unstructured":"Thangavelooa, R., Jinga, W.W., Lenga, C.K., Abdullaha, J.: DATDroid: dynamic analysis technique in android malware detection. Int. J. Adv. Sci. Eng. Inf. Technol. 10, 536\u2013541 (2020)","journal-title":"Int. J. Adv. Sci. Eng. Inf. Technol."},{"key":"14_CR26","volume":"189","author":"J Lee","year":"2022","unstructured":"Lee, J., Park, S., Jung, J.: Detecting malicious behavior in Android apps through analyzing inter-app information flows. Expert Syst. Appl. 189, 116124 (2022)","journal-title":"Expert Syst. Appl."},{"key":"14_CR27","unstructured":"Zhang, H., Chan, P.P., Cheung, N.M.: Android malware detection based on generative adversarial network. Neural Comput. Appl. (2023)"}],"container-title":["IFIP Advances in Information and Communication Technology","Artificial Intelligence Applications and Innovations"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-63215-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T15:18:29Z","timestamp":1718723909000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-63215-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031632143","9783031632150"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-63215-0_14","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"19 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Artificial Intelligence Applications and Innovations","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Corfu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aiai2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ifipaiai.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}