{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T06:49:16Z","timestamp":1770274156907,"version":"3.49.0"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319473635","type":"print"},{"value":"9783319473642","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,10,1]],"date-time":"2016-10-01T00:00:00Z","timestamp":1475280000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-47364-2_59","type":"book-chapter","created":{"date-parts":[[2016,9,30]],"date-time":"2016-09-30T12:41:56Z","timestamp":1475239316000},"page":"607-617","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Characterization of Android Malware Families by a Reduced Set of Static Features"],"prefix":"10.1007","author":[{"given":"Javier","family":"Sedano","sequence":"first","affiliation":[]},{"given":"Camelia","family":"Chira","sequence":"additional","affiliation":[]},{"given":"Silvia","family":"Gonz\u00e1lez","sequence":"additional","affiliation":[]},{"given":"\u00c1lvaro","family":"Herrero","sequence":"additional","affiliation":[]},{"given":"Emilio","family":"Corchado","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 Ram\u00f3n","family":"Villar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,1]]},"reference":[{"key":"59_CR1","unstructured":"Statista - The Statistics Portal. http:\/\/www.statista.com\/statistics\/266219\/global-smartphone-sales-since-1st-quarter-2009-by-operating-system\/. Accessed 08 July 2016"},{"key":"59_CR2","unstructured":"AppBrain Stats. http:\/\/www.appbrain.com\/stats\/stats-index. Accessed 08 July 2016"},{"key":"59_CR3","unstructured":"Micro, T.: The Fine Line: 2016 Trend Micro Security Predictions (2015)"},{"key":"59_CR4","unstructured":"Mind the (Security) Gaps: The 1H 2015 Mobile Threat Landscape. http:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/mobile-safety\/mind-the-security-gaps-1h-2015-mobile-threat-landscape. Accessed 08 July 2016"},{"key":"59_CR5","unstructured":"F-Secure: Q1 2014 Mobile Threat Report (2015)"},{"key":"59_CR6","doi-asserted-by":"crossref","unstructured":"Yajin, Z., Xuxian, J.: Dissecting android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy, pp. 95\u2013109 (2012)","DOI":"10.1109\/SP.2012.16"},{"key":"59_CR7","doi-asserted-by":"crossref","unstructured":"Spreitzenbarth, M., Echtler, F., Schreck, T., Freling, F.C., Hoffmann, J.: Mobile-sandbox: having a deeper look into android applications. In: 28th International ACM Symposium on Applied Computing (SAC) (2013)","DOI":"10.1145\/2480362.2480701"},{"key":"59_CR8","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K.: DREBIN: effective and explainable detection of android malware in your pocket. In: 21st Annual Network and Distributed System Security Symposium (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"59_CR9","first-page":"1157","volume":"3","author":"I Guyon","year":"2003","unstructured":"Guyon, I., Elisseeff, A.: An introduction to variable and feature selection. J. Mach. Learn. Res. 3, 1157\u20131182 (2003)","journal-title":"J. Mach. Learn. Res."},{"key":"59_CR10","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1093\/bib\/bbk007","volume":"7","author":"P Larra\u00f1aga","year":"2006","unstructured":"Larra\u00f1aga, P., Calvo, B., Santana, R., Bielza, C., Galdiano, J., Inza, I., Lozano, J.A., Arma\u00f1anzas, R., Santaf\u00e9, G., P\u00e9rez, A.: Machine learning in bioinformatics. Briefings Bioinform. 7, 86\u2013112 (2006)","journal-title":"Briefings Bioinform."},{"key":"59_CR11","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1142\/S0219720005001004","volume":"3","author":"C Ding","year":"2005","unstructured":"Ding, C., Peng, H.: Minimum redundancy feature selection from microarray gene expression data. J. Bioinform. Comput. Biol. 3, 185\u2013205 (2005)","journal-title":"J. Bioinform. Comput. Biol."},{"key":"59_CR12","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.jbi.2009.08.010","volume":"43","author":"H Liu","year":"2010","unstructured":"Liu, H., Liu, L., Zhang, H.: Ensemble gene selection by grouping for microarray data classification. J. Biomed. Inform. 43, 81\u201387 (2010)","journal-title":"J. Biomed. Inform."},{"key":"59_CR13","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.diin.2015.02.001","volume":"13","author":"A Feizollah","year":"2015","unstructured":"Feizollah, A., Anuar, N.B., Salleh, R., Wahab, A.W.A.: A review on feature selection in mobile malware detection. Digit. Invest. 13, 22\u201337 (2015)","journal-title":"Digit. Invest."},{"key":"59_CR14","doi-asserted-by":"crossref","unstructured":"Hyo-Sik, H., Mi-Jung, C.: Analysis of android malware detection performance using machine learning classifiers. In: 2013 International Conference on ICT Convergence (2013), pp. 490\u2013495","DOI":"10.1109\/ICTC.2013.6675404"},{"key":"59_CR15","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-642-17758-3_17","volume-title":"Mobile Wireless Middleware, Operating Systems, and Applications","author":"A Shabtai","year":"2010","unstructured":"Shabtai, A., Elovici, Y.: Applying behavioral detection on android-based devices. In: Magedanz, T., Li, M., Xia, J., Giannelli, C., Cai, Y. (eds.) Mobilware 2010. LNICST, vol. 48, pp. 235\u2013249. Springer, Heidelberg (2010)"},{"key":"59_CR16","doi-asserted-by":"crossref","unstructured":"Shabtai, A., Fledel, Y., Elovici, Y.: Automated static code analysis for classifying android applications using machine learning. In: 2010 International Conference on Computational Intelligence and Security, pp. 329\u2013333 (2010)","DOI":"10.1109\/CIS.2010.77"},{"key":"59_CR17","doi-asserted-by":"crossref","unstructured":"Vinod, P., Laxmi, V., Gaur, M.S., Naval, S., Faruki, P.: MCF: multicomponent features for malware analysis. In: 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 1076\u20131081 (2013)","DOI":"10.1109\/WAINA.2013.147"},{"key":"59_CR18","doi-asserted-by":"crossref","unstructured":"Battista, P., Mercaldo, F., Nardone, V., Santone, A., Visaggio, C.: Identification of android malware families with model checking. In: 2nd International Conference on Information Systems Security and Privacy (2016)","DOI":"10.5220\/0005809205420547"},{"key":"59_CR19","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-319-19713-5_15","volume-title":"International Joint Conference","author":"J Sedano","year":"2015","unstructured":"Sedano, J., Chira, C., Gonz\u00e1lez, S., Herrero, \u00c1., Corchado, E., Villar, J.R.: On the selection of key features for android malware characterization. In: Herrero, \u00c1., Baruque, B., Sedano, J., Quinti\u00e1n, H., Corchado, E. (eds.) International Joint Conference. AISC, vol. 369, pp. 167\u2013176. Springer, Heidelberg (2015)"},{"key":"59_CR20","unstructured":"Virus Total. https:\/\/www.virustotal.com. Accessed 08 July 2016"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201916-CISIS\u201916-ICEUTE\u201916"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47364-2_59","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T22:08:58Z","timestamp":1749593338000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-47364-2_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,1]]},"ISBN":["9783319473635","9783319473642"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47364-2_59","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,1]]},"assertion":[{"value":"1 October 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICEUTE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on EUropean Transnational Education","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Sebasti\u00e1n","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 October 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iceute2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}