{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T03:43:14Z","timestamp":1771299794069,"version":"3.50.1"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319042824","type":"print"},{"value":"9783319042831","type":"electronic"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-04283-1_6","type":"book-chapter","created":{"date-parts":[[2013,12,16]],"date-time":"2013-12-16T21:28:18Z","timestamp":1387229298000},"page":"86-103","source":"Crossref","is-referenced-by-count":454,"title":["DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android"],"prefix":"10.1007","author":[{"given":"Yousra","family":"Aafer","sequence":"first","affiliation":[]},{"given":"Wenliang","family":"Du","sequence":"additional","affiliation":[]},{"given":"Heng","family":"Yin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"ActivityManager, http:\/\/developer.android.com\/reference\/android\/app\/ActivityManager.html"},{"key":"6_CR2","unstructured":"Androguard, http:\/\/code.google.com\/p\/androguard\/"},{"key":"6_CR3","unstructured":"Android Malware Genome Project, http:\/\/www.malgenomeproject.org\/"},{"key":"6_CR4","unstructured":"Intent, http:\/\/developer.android.com\/reference\/android\/content\/Intent.html"},{"key":"6_CR5","unstructured":"Malware that Takes Without Asking, http:\/\/labs.mwrinfosecurity.com\/tools\/2012\/03\/16\/mercury\/documentation\/white-paper\/malware-that-takes-without-asking\/"},{"key":"6_CR6","unstructured":"Process, http:\/\/developer.android.com\/reference\/android\/os\/Process.html"},{"key":"6_CR7","unstructured":"RapidMiner, http:\/\/rapid-i.com\/content\/view\/181\/190\/"},{"key":"6_CR8","first-page":"37","volume":"6","author":"D.W. Aha","year":"1991","unstructured":"Aha, D.W., Kibler, D., Albert, M.K.: Instance-Based Learning Algorithms. Machine Learning\u00a06, 37\u201366 (1991)","journal-title":"Machine Learning"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Blasing, T., Batyuk, L., Schmidt, A.-D., Camtepe, S.A., Albayrak, S.: An Android Application Sandbox System for Suspicious Software Detection. In: MALWARE (2010)","DOI":"10.1109\/MALWARE.2010.5665792"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Burguera, I., Zurutuza, U., Nadijm-Tehrani, S.: Crowdroid: Behavior-Based Malware Detection System for Android. In: SPSM (2011)","DOI":"10.1145\/2046614.2046619"},{"key":"6_CR11","unstructured":"Enck, W., Gilbert, P., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In: USENIX, OSDI (2011)"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: On Lightweight Mobile Phone Application Certication. In: CCS (2009)","DOI":"10.1145\/1653662.1653691"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android Permissions Demystied. In: CCS (2011)","DOI":"10.1145\/2046707.2046779"},{"key":"6_CR14","unstructured":"Felt, A.P., Greenwood, K., Wagner, D.: The Effectiveness of Application Permissions. In: USENIX, WebApps (2011)"},{"key":"6_CR15","unstructured":"Grace, M., Zhou, Y., Wang, Z., Jiang, X.: Systematic Detection of Capability Leaks in Stock Android Smartphones. In: NDSS (2012)"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Lu, L., Li, Z., Wu, Z., Lee, W., Jiang, G.I.: CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities. In: CCS (2012)","DOI":"10.1145\/2382196.2382223"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Peng, H., Gates, C., Sarma, B., Li, N., Qi, Y., Potharaju, R.: Using Probabilistic Generative Models for Ranking Risks of Android Apps. In: CCS (2012)","DOI":"10.1145\/2382196.2382224"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Portokalidis, G., Homburg, P., Anagnostakis, K., Bos, H.: Paranoid Android: Versatile Protection for Smartphones. In: ACSAC (2010)","DOI":"10.1145\/1920261.1920313"},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-642-28166-2_11","volume-title":"Engineering Secure Software and Systems","author":"R. Potharaju","year":"2012","unstructured":"Potharaju, R., Newell, A., Nita-Rotaru, C., Zhang, X.: Plagiarizing Smartphone Applications: Attack Strategies and Defense. In: Barthe, G., Livshits, B., Scandariato, R. (eds.) ESSoS 2012. LNCS, vol.\u00a07159, pp. 106\u2013120. Springer, Heidelberg (2012)"},{"issue":"1","key":"6_CR20","first-page":"81","volume":"1","author":"J.R. Quinlan","year":"1986","unstructured":"Quinlan, J.R.: Induction of Decision Tree. Machine Learning\u00a01(1), 81\u2013106 (1986)","journal-title":"Machine Learning"},{"key":"6_CR21","unstructured":"Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann (1993)"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Sarma, B., Li, N., Gates, C., Potharaju, R., Nita-Rotaru, C., Molloy, I.: Android Permissions: A Perspective Combining Risks and Benets. In: SACMAT (2012)","DOI":"10.1145\/2295136.2295141"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Schmidt, A.-D., Bye, R., Schmidt, H.-G., Clausen, J., Kiraz, O., Yuksel, K.A., Camtepe, S.A., Albayrak, S.: Static Analysis of Executables for Collaborative Malware Detection on Android. In: ICC (2009)","DOI":"10.1109\/ICC.2009.5199486"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: Andromaly: a Behavioral Malware Detection Framework for Android Devices. Journal of Intelligent Information Systems Archive\u00a038(1) (2012)","DOI":"10.1007\/s10844-010-0148-x"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Vapnik, V.: The Nature of Statistical Learning Theory. Springer, NY (1995)","DOI":"10.1007\/978-1-4757-2440-0"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Wei, X., Gomez, L., Neamtiu, I., Faloutsos, M.: Permission Evolution in the Android Ecosystem. In: ACSAC (2012)","DOI":"10.1145\/2420950.2420956"},{"key":"6_CR27","unstructured":"Yan, L.K., Yin, H.: DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis. In: USENIX, Security (2012)"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces. In: CODASPY (2012)","DOI":"10.1145\/2133601.2133640"},{"key":"6_CR29","unstructured":"Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In: NDSS (2012)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-04283-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,4]],"date-time":"2019-08-04T20:27:15Z","timestamp":1564950435000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-04283-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319042824","9783319042831"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-04283-1_6","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}