{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T08:40:09Z","timestamp":1748767209269,"version":"3.41.0"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319274775"},{"type":"electronic","value":"9783319274782"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-27478-2_20","type":"book-chapter","created":{"date-parts":[[2016,1,30]],"date-time":"2016-01-30T10:45:54Z","timestamp":1454150754000},"page":"289-304","source":"Crossref","is-referenced-by-count":13,"title":["Bio-inspired Hybrid Intelligent Method for Detecting Android Malware"],"prefix":"10.1007","author":[{"given":"Konstantinos","family":"Demertzis","sequence":"first","affiliation":[]},{"given":"Lazaros","family":"Iliadis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,31]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Alam M.S., Vuong S.T.: Random forest classification for detecting android malware. In: IEEE IC on Green Computing and Communications and Internet of Things (2013)","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.122"},{"key":"20_CR2","unstructured":"Amos, B.: Antimalware. https:\/\/github.com\/VT-Magnum-Research\/antimalware (2013)"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Barrera, D., Kayacik, H., Oorshot, P., Somayaji, A.: A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android. ACM (2010)","DOI":"10.1145\/1866307.1866317"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: 1st ACM Workshop on on SPSM, pp. 15\u201326. ACM (2011)","DOI":"10.1145\/2046614.2046619"},{"key":"20_CR5","unstructured":"Cambria E., Huang G.-B.: Extreme learning machines. IEEE Intell. Syst. (2013)"},{"key":"20_CR6","unstructured":"Cheng, C., Peng, W.T, Huang, G.-B.: Extreme learning machines for intrusion detection. In: WCCI IEEE World Congress on Computational Intelligence Brisbane, Australia (2012)"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Chin E., Felt A., Greenwood K., Wagner D.: Analyzing inter-application communication in android. In: 9th Conference on Mobile Systems, Applications, and Services, pp. 239\u2013252. ACM (2011)","DOI":"10.1145\/1999995.2000018"},{"issue":"1\u20134","key":"20_CR8","first-page":"539","volume":"38\u201340","author":"A Delorme","year":"2000","unstructured":"Delorme, A., Perrinet, L., Thorpe, S.J.: Networks of Integrate-and-fire neurons using rank order coding b: spike timing dependant plasticity and emergence of orientation selectivity. Neurocomputing 38\u201340(1\u20134), 539\u2013545 (2000)","journal-title":"Neurocomputing"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: Proceedings of the 16th ACM Conference on Computer Security, CSS (2009)","DOI":"10.1145\/1653662.1653691"},{"key":"20_CR10","unstructured":"Fedler, R., Banse, C., Krau\u00df, Ch., Fusenig, V.: Android OS security: risks and limitations a practical evaluation, AISEC Technical Reports, AISEC-TR-2012\u2013001 (2012)"},{"key":"20_CR11","unstructured":"Fuchs, A., Chaudhuri, A., Foster, J.: ScanDroid: automated security certification of android applications, Technical report, University of Maryland (2009)"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Ghorbanzadeh, M., Chen, Y., Zhongmin, M., Clancy, C.T., McGwier, R.: A neural network approach to category validation of android applications. In: International Conference on Computing, Networking and Communications, Cognitive Computing and Networking Symposium (2013)","DOI":"10.1109\/ICCNC.2013.6504180"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Glodek, W., Harang R.R.: Permissions-based detection and analysis of mobile malware using random decision forests. In: IEEE Military Communications Conference (2013)","DOI":"10.1109\/MILCOM.2013.170"},{"key":"20_CR14","unstructured":"Google, UI\/Application Exerciser Monkey. http:\/\/developer.android.com\/tools\/help\/monkey.html (2013)"},{"issue":"3","key":"20_CR15","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/s12559-014-9255-2","volume":"6","author":"Guang-Bin Huang","year":"2014","unstructured":"Huang, G.-B.: An Insight into Extreme Learning Machines: Random Neurons, Random Features and Kernels. Springer (2014). doi: 10.1007\/s12559-014-9255-2","journal-title":"Cognitive Computation"},{"key":"20_CR16","unstructured":"Joseph, J.F.C., Lee, B.-S., Das, A., Seet, B,-C.: Cross-layer detection of sinking behavior in wireless ad hoc networks using ELM and FDA. IEEE IJCA 54(14) (2012)"},{"key":"20_CR17","volume-title":"Evolving connectionist systems: Methods and Applications in Bioinformatics, Brain study and intelligent machines","author":"N Kasabov","year":"2002","unstructured":"Kasabov, N.: Evolving connectionist systems: Methods and Applications in Bioinformatics, Brain study and intelligent machines. Springer Verlag, NY (2002)"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Kohonen, T.: Self-organizing networks. In: Proceedings of the IEEE (1990)","DOI":"10.1109\/5.58325"},{"key":"20_CR19","unstructured":"Kolter, J.Z., Maloof, M.A.: Learning to detect malicious executables in the wild. In: International Conference on Knowledge Discovery and Data Mining, pp. 470\u2013478 (2006)"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Lange, M., Liebergeld, S., Lackorzynski, A., Peter M.: L4Android: a generic operating system framework for secure smartphones. In: ACM Workshop on SPSM (2011)","DOI":"10.1145\/2046614.2046623"},{"key":"20_CR21","unstructured":"MacQueen, J.: Some methods for classification and analysis of multivariate observations. In: Proceedings of the 5th Berkeley Symposium on Mathematical Statistics and Probability (1967)"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Portokalidis, G., Homburg, P., Anagnostakis, K., Bos, H.: Paranoid Android: versatile protection for smartphones. In: 26th Annual Computer Security Applications Conference (2010)","DOI":"10.1145\/1920261.1920313"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Sahs, J., Khan, L.: A Machine learning approach to android malware detection. In: European Intelligence and Security Informatics Conference (2012)","DOI":"10.1109\/EISIC.2012.34"},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"Scandariato, R., Walden, J.: Predicting Vulnerable Classes in an Android Application (2012)","DOI":"10.1145\/2372225.2372231"},{"issue":"2","key":"20_CR25","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/s12530-013-9074-9","volume":"4","author":"Stefan Schliebs","year":"2013","unstructured":"Schliebs, S., Kasabov, N.: Evolving spiking neural network\u2014a survey. Evolving Systems 4(2), 87\u201398 (2013)","journal-title":"Evolving Systems"},{"key":"20_CR26","doi-asserted-by":"crossref","unstructured":"Schliebs, S., Defoin-Platel, M., Kasabov, N.: Integrated Feature and Parameter Optimization for an Evolving Spiking Neural Network, 5506, pp. 1229\u20131236. Springer (2009)","DOI":"10.1007\/978-3-642-02490-0_149"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Schultz, M.G., Eskin, E., Zadok, E., Stolfo, S. J.: Data mining methods for detection of new malicious executables. In: SP \u201901, pp. 38. IEEE Computer Society, Washington, DC (2001)","DOI":"10.1109\/SECPRI.2001.924286"},{"key":"20_CR28","doi-asserted-by":"crossref","unstructured":"Shabtai, A., Fledel, Y., Elovici, Y.: Automated static code analysis for classifying android applications using machine learning. In: IC Computational Intelligence and Security (2010)","DOI":"10.1109\/CIS.2010.77"},{"key":"20_CR29","doi-asserted-by":"crossref","unstructured":"Shabtai, A., Fledel, Y., Elovici Y.: Automated static code analysis for classifying android applications using machine learning, in CIS. In: Conference on IEEE, pp. 329\u2013333 (2010)","DOI":"10.1109\/CIS.2010.77"},{"issue":"4","key":"20_CR30","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/64.511768","volume":"11","author":"GJ Tesauro","year":"1996","unstructured":"Tesauro, G.J., Kephart, J.O., Sorkin, G.B.: Neural networks for computer virus recognition. IEEE Expert 11(4), 5\u20136 (1996)","journal-title":"IEEE Expert"},{"issue":"6\u20137","key":"20_CR31","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1016\/S0893-6080(01)00083-1","volume":"14","author":"SJ Thorpe","year":"2001","unstructured":"Thorpe, S.J., Delorme, A.: Rufin van Rullen: Spike-based strategies for rapid processing. Neural Netw. 14(6\u20137), 715\u2013725 (2001)","journal-title":"Neural Netw."},{"key":"20_CR32","doi-asserted-by":"crossref","unstructured":"Thorpe, S.J., Gautrais, J.: Rank order coding. In: CNS \u201997: 6th Conference on Computational Neuroscience: Trends in Research, pp. 113\u2013118. Plenum Press (1998)","DOI":"10.1007\/978-1-4615-4831-7_19"},{"key":"20_CR33","unstructured":"www.wala.sourceforge.net\/wiki\/index.php"},{"key":"20_CR34","unstructured":"www.extreme-learning-machines.org\/"},{"key":"20_CR35","unstructured":"www.cs.waikato.ac.nz\/ml\/weka"},{"key":"20_CR36","unstructured":"www.gmdhshell.com\/"},{"key":"20_CR37","doi-asserted-by":"crossref","first-page":"1133","DOI":"10.1007\/11864349_103","volume-title":"Advanced Concepts for Intelligent Vision Systems","author":"Simei Gomes Wysoski","year":"2006","unstructured":"Wysoski, S.G., Benuskova, L., Kasabov, N.K.: Adaptive learning procedure for a network of spiking neurons and visual pattern recognition. In: Advanced Concepts for Intelligent Vision Systems, pp. 1133\u20131142. Springer Berlin\/Heidelberg (2006)"}],"container-title":["Advances in Intelligent Systems and Computing","Knowledge, Information and Creativity Support Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27478-2_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T08:09:04Z","timestamp":1748765344000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27478-2_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319274775","9783319274782"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27478-2_20","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016]]}}}