{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T07:29:33Z","timestamp":1761290973860,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319018539"},{"type":"electronic","value":"9783319018546"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-01854-6_48","type":"book-chapter","created":{"date-parts":[[2013,8,8]],"date-time":"2013-08-08T06:47:25Z","timestamp":1375944445000},"page":"469-478","source":"Crossref","is-referenced-by-count":15,"title":["Anomaly Detection Using String Analysis for Android Malware Detection"],"prefix":"10.1007","author":[{"given":"Borja","family":"Sanz","sequence":"first","affiliation":[]},{"given":"Igor","family":"Santos","sequence":"additional","affiliation":[]},{"given":"Xabier","family":"Ugarte-Pedrero","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Laorden","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Nieves","sequence":"additional","affiliation":[]},{"given":"Pablo Garc\u00eda","family":"Bringas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"48_CR1","doi-asserted-by":"crossref","unstructured":"Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 15\u201326. ACM (2011)","DOI":"10.1145\/2046614.2046619"},{"key":"48_CR2","doi-asserted-by":"crossref","unstructured":"Blasing, T., Batyuk, L., Schmidt, A.D., Camtepe, S.A., Albayrak, S.: An android application sandbox system for suspicious software detection. In: 2010 5th International Conference on Malicious and Unwanted Software (MALWARE), pp. 55\u201362. IEEE (2010)","DOI":"10.1109\/MALWARE.2010.5665792"},{"key":"48_CR3","doi-asserted-by":"crossref","unstructured":"Shabtai, A., Elovici, Y.: Applying behavioral detection on android-based devices. In: Mobile Wireless Middleware, Operating Systems, and Applications, pp. 235\u2013249 (2010)","DOI":"10.1007\/978-3-642-17758-3_17"},{"key":"48_CR4","doi-asserted-by":"crossref","unstructured":"Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X., Bringas, P., Alvarez, G.: Puma: Permission usage to detect malware in android. In: Proceedings of the 5th International Conference on Computational Intelligence in Security for Information Systems, CISIS (2012)","DOI":"10.1007\/978-3-642-33018-6_30"},{"key":"48_CR5","doi-asserted-by":"crossref","unstructured":"Santos, I., Penya, Y., Devesa, J., Bringas, P.: N-Grams-based file signatures for malware detection. In: Proceedings of the 11th International Conference on Enterprise Information Systems (ICEIS), vol.\u00a0AIDSS, pp. 317\u2013320 (2009)","DOI":"10.5220\/0001863603170320"},{"key":"48_CR6","series-title":"AISC","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/978-3-642-33018-6_28","volume-title":"International Joint Conference CISIS\u201912-ICEUTE\u00b412-SOCO\u00b412 Special Sessions","author":"I. Santos","year":"2013","unstructured":"Santos, I., Devesa, J., Brezo, F., Nieves, J., Bringas, P.G.: Opem: A static-dynamic approach for machine-learning-based malware detection. In: Herrero, \u00c1., et al. (eds.) Int. Joint Conf. CISIS\u201912-ICEUTE\u201912-SOCO\u201912. AISC, vol.\u00a0189, pp. 271\u2013280. Springer, Heidelberg (2013)"},{"key":"48_CR7","volume-title":"Modern Information Retrieval","author":"R.A. Baeza-Yates","year":"1999","unstructured":"Baeza-Yates, R.A., Ribeiro-Neto, B.: Modern Information Retrieval. Addison-Wesley Longman Publishing Co., Inc., Boston (1999)"},{"key":"48_CR8","volume-title":"Introduction to modern information retrieval","author":"G. Salton","year":"1983","unstructured":"Salton, G., McGill, M.: Introduction to modern information retrieval. McGraw-Hill, New York (1983)"},{"issue":"2","key":"48_CR9","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1328854.1328855","volume":"36","author":"S. Tata","year":"2007","unstructured":"Tata, S., Patel, J.M.: Estimating the selectivity of tf-idf based cosine similarity predicates. ACM SIGMOD Record\u00a036(2), 7\u201312 (2007)","journal-title":"ACM SIGMOD Record"},{"issue":"2","key":"48_CR10","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1504\/IJCAT.2009.026595","volume":"35","author":"Y. Singh","year":"2009","unstructured":"Singh, Y., Kaur, A., Malhotra, R.: Comparative analysis of regression and machine learning methods for predicting fault proneness models. International Journal of Computer Applications in Technology\u00a035(2), 183\u2013193 (2009)","journal-title":"International Journal of Computer Applications in Technology"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201913-CISIS\u201913-ICEUTE\u201913"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-01854-6_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T09:26:16Z","timestamp":1674206776000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-01854-6_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319018539","9783319018546"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-01854-6_48","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}