{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T04:40:03Z","timestamp":1748407203418,"version":"3.41.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319196435"},{"type":"electronic","value":"9783319196442"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19644-2_35","type":"book-chapter","created":{"date-parts":[[2015,5,28]],"date-time":"2015-05-28T18:15:39Z","timestamp":1432836939000},"page":"416-426","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Using Dalvik Opcodes for Malware Detection on Android"],"prefix":"10.1007","author":[{"given":"Jos\u00e9 Gaviria","family":"de la Puerta","sequence":"first","affiliation":[]},{"given":"Borja","family":"Sanz","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Santos","sequence":"additional","affiliation":[]},{"given":"Pablo Garc\u00eda","family":"Bringas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,29]]},"reference":[{"key":"35_CR1","unstructured":"Waters, D.: Google bets on Android future, February 2008. http:\/\/news.bbc.co.uk\/2\/hi\/technology\/7266201.stm"},{"key":"35_CR2","unstructured":"Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of android application security. In: USENIX Security Symposium (2011)"},{"key":"35_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-33167-1_1","volume-title":"Computer Security \u2013 ESORICS 2012","author":"E Fragkaki","year":"2012","unstructured":"Fragkaki, E., Bauer, L., Jia, L., Swasey, D.: Modeling and enhancing android\u2019s permission system. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 1\u201318. Springer, Heidelberg (2012)"},{"key":"35_CR4","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-642-33018-6_30","volume-title":"International Joint Conference CISIS\u201912-ICEUTE\u201912-SOCO\u201912 Special Sessions","author":"B Sanz","year":"2013","unstructured":"Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X., Bringas, P.G., \u00c1lvarez, G.: PUMA: permission usage to detect malware in android. In: Herrero, \u00c1., et al. (eds.) Int. Joint Conf. CISIS 2012-ICEUTE 2012-SOCO 2012. AISC, vol. 189, pp. 289\u2013298. Springer, Heidelberg (2013)"},{"key":"35_CR5","doi-asserted-by":"crossref","unstructured":"Shin, W., Kiyomoto, S., Fukushima, K., Tanaka, T.: Towards formal analysis of the permission-based security model for android. In: Fifth International Conference on Wireless and Mobile Communications, ICWMC 2009, pp. 87\u201392. IEEE (2009)","DOI":"10.1109\/ICWMC.2009.21"},{"key":"35_CR6","doi-asserted-by":"crossref","unstructured":"Shin, W., Kiyomoto, S., Fukushima, K., Tanaka, T.: A formal model to analyze the permission authorization and enforcement in the android framework. In: 2010 IEEE Second International Conference on Social Computing (SocialCom), pp. 944\u2013951. IEEE (2010)","DOI":"10.1109\/SocialCom.2010.140"},{"key":"35_CR7","doi-asserted-by":"crossref","unstructured":"Jacoby, G.A., Davis IV, N.J.: Battery-based intrusion detection. In: Global Telecommunications Conference, GLOBECOM 2004, vol. 4, pp. 2250\u20132255. IEEE (2004)","DOI":"10.1109\/GLOCOM.2004.1378409"},{"key":"35_CR8","doi-asserted-by":"crossref","unstructured":"Buennemeyer, T.K., Nelson, T.M., Clagett, L.M., Dunning, J.P., Marchany, R.C., Tront, J.G.: Mobile device profiling and intrusion detection using smart batteries. In: Proceedings of the 41st Annual Hawaii International Conference on System Sciences, pp. 296\u2013296. IEEE (2008)","DOI":"10.1109\/HICSS.2008.319"},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"Schmidt, A.D., Bye, R., Schmidt, H.G., Clausen, J., Kiraz, O., Yuksel, K.A., Camtepe, S.A., Albayrak, S.: Static analysis of executables for collaborative malware detection on android. In: IEEE International Conference on Communications, ICC 2009. pp. 1\u20135. IEEE (2009)","DOI":"10.1109\/ICC.2009.5199486"},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"Shabtai, A., Fledel, Y., Elovici, Y.: Automated static code analysis for classifying android applications using machine learning. In: 2010 International Conference on Computational Intelligence and Security (CIS), pp. 329\u2013333. IEEE (2010)","DOI":"10.1109\/CIS.2010.77"},{"key":"35_CR11","doi-asserted-by":"crossref","unstructured":"Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting repackaged smartphone applications in third-party android marketplaces. In: Proceedings of the Second ACM Conference on Data and Application Security and Privacy, pp. 317\u2013326. ACM (2012)","DOI":"10.1145\/2133601.2133640"},{"issue":"4","key":"35_CR12","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1049\/iet-ifs.2010.0180","volume":"5","author":"I Santos","year":"2011","unstructured":"Santos, I., Brezo, F., Sanz, B., Laorden, C., Bringas, P.G.: Using opcode sequences in single-class learning to detect unknown malware. IET Inf. Secur. 5(4), 220\u2013227 (2011)","journal-title":"IET Inf. Secur."},{"key":"35_CR13","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 95\u2013109. IEEE (2012)","DOI":"10.1109\/SP.2012.16"},{"issue":"2","key":"35_CR14","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1504\/IJCAT.2009.026595","volume":"35","author":"Y Singh","year":"2009","unstructured":"Singh, Y., Kaur, A., Malhotra, R.: Comparative analysis of regression and machine learning methods for predicting fault proneness models. Int. J. Comput. Appl. Technol. 35(2), 183\u2013193 (2009)","journal-title":"Int. J. Comput. Appl. Technol."},{"key":"35_CR15","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45, 5\u201332 (2001). doi:10.1023\/A:1010933404324","journal-title":"Mach. Learn."},{"key":"35_CR16","volume-title":"C4. 5: Programs for Machine Learning","author":"J Quinlan","year":"1993","unstructured":"Quinlan, J.: C4. 5: Programs for Machine Learning. Morgan kaufmann, San Francisco (1993)"},{"key":"35_CR17","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/BF00993309","volume":"16","author":"SL Salzberg","year":"1994","unstructured":"Salzberg, S.L.: C4.5: Programs for machine learning by J. Ross Quinlan. Morgan Kaufmann Publishers, Inc., 1993. Mach. Learn. 16, 235\u2013240 (1994). doi:10.1007\/BF00993309","journal-title":"Mach. Learn."},{"key":"35_CR18","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-540-73871-8_14","volume-title":"Advanced Data Mining and Applications","author":"L Jiang","year":"2007","unstructured":"Jiang, L., Wang, D., Cai, Z., Yan, X.: Survey of improving Naive Bayes for classification. In: Alhajj, R., Gao, H., Li, X., Li, J., Za\u00efane, O.R. (eds.) ADMA 2007. LNCS (LNAI), vol. 4632, pp. 134\u2013145. Springer, Heidelberg (2007)"},{"key":"35_CR19","unstructured":"Platt, J.C.: Sequential minimal optimization: a fast algorithm for training support vector machines (1998)"}],"container-title":["Lecture Notes in Computer Science","Hybrid Artificial Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19644-2_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T04:07:47Z","timestamp":1748405267000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-19644-2_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319196435","9783319196442"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19644-2_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"29 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}