{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:26:26Z","timestamp":1725798386576},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319111933"},{"type":"electronic","value":"9783319111940"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11194-0_52","type":"book-chapter","created":{"date-parts":[[2014,8,12]],"date-time":"2014-08-12T14:25:55Z","timestamp":1407853555000},"page":"590-600","source":"Crossref","is-referenced-by-count":3,"title":["A Design of Network Behavior-Based Malware Detection System for Android"],"prefix":"10.1007","author":[{"given":"Yincheng","family":"Qi","sequence":"first","affiliation":[]},{"given":"Mingjing","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Can","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ruping","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"52_CR1","unstructured":"Net Qin released the 2013 global mobile phone safety report, \n                    \n                      http:\/\/finance.chinanews.com\/it\/2014\/02-26\/5885596.shtml"},{"key":"52_CR2","unstructured":"2013ISC Experts Detailed: current status and future of network security, \n                    \n                      http:\/\/soft.yesky.com\/398\/35354398.shtml"},{"key":"52_CR3","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1007\/978-3-642-35795-4_81","volume-title":"Trustworthy Computing and Services","author":"Y. Li","year":"2013","unstructured":"Li, Y., Zhai, L., Wang, Z., Ren, Y.: Control Method of Twitter-and SMS-Based Mobile Botnet. In: Yuan, Y., Wu, X., Lu, Y. (eds.) ISCTCS 2012. CCIS, vol.\u00a0320, pp. 644\u2013650. Springer, Heidelberg (2013)"},{"key":"52_CR4","unstructured":"Zhai, L.D., Li, Y.: APT Threat Detection and Protection of Network Space. J. Netinfo Security\u00a0(3), 56\u201360 (2013)"},{"key":"52_CR5","unstructured":"Yi, L.L., Zhang, N., Liu, D.: Current Situation and Development Trend of Mobile Malware. J. Information and Communications Technologies\u00a0(2), 75\u201379 (2013)"},{"key":"52_CR6","unstructured":"Liu, J.R., Wang, W.J., Liu, B.X.: A Trojan horse detection model based on network behavior analysis. In: The 16th National Conference on Nuclear Electronics and Nuclear Detection Technology Academic Annual Meeting, Mianyang, Sichuan (2012)"},{"key":"52_CR7","doi-asserted-by":"crossref","unstructured":"Dai, S., Liu, Y., Wang, T.: Behavior-based malware detection on mobile phone. In: 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), pp. 1\u20134. IEEE (2010)","DOI":"10.1109\/WICOM.2010.5601291"},{"key":"52_CR8","doi-asserted-by":"crossref","unstructured":"Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 15\u201326. ACM (2011)","DOI":"10.1145\/2046614.2046619"},{"key":"52_CR9","unstructured":"Tong, Z.F., Yang, G.: The Detection of Malware Static Behaviors for Android. J. Jiangsu Communication\u00a0(1), 39\u201347 (2011)"},{"key":"52_CR10","unstructured":"Zhong, W.: Research on Bayes Classification and its Application in Intrusion Detection. Central South University of Forestory and Technology (2008)"},{"key":"52_CR11","unstructured":"Cai, Z.T., Jiang, M.: Android Malware Detection of Using Naive Bayes Based on Permissions. J. Computer Knowledge and Technology\u00a0(14), 3288\u20133291 (2013)"},{"issue":"9","key":"52_CR12","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/MC.2012.36","volume":"45","author":"M. Chandramohan","year":"2012","unstructured":"Chandramohan, M., Tan, H.B.K.: Detection of Mobile Malware in the Wild. Computer\u00a045(9), 65\u201371 (2012)","journal-title":"Computer"},{"key":"52_CR13","unstructured":"Google. Android Home Page, \n                    \n                      http:\/\/www.android.com"},{"key":"52_CR14","unstructured":"Jia, W., Han, M.K.: Data Mining Concepts and Technique, 2nd edn. China Machine Press (2006)"},{"key":"52_CR15","unstructured":"Li, W.: The advantages and disadvantages\u00a0of the\u00a0commonly used classifiers. J. Technology Trend.\u00a0(3), 59 (2009)"},{"key":"52_CR16","doi-asserted-by":"crossref","unstructured":"Zhou, Y.J., Jiang, X.X.: Dissecting Android Malware: Characterization and Evolution. In: 2012 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, May 20-23 (2012)","DOI":"10.1109\/SP.2012.16"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11194-0_52","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T15:20:56Z","timestamp":1558970456000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11194-0_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319111933","9783319111940"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11194-0_52","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}