{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:56:11Z","timestamp":1725868571762},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491080"},{"type":"electronic","value":"9783319491097"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49109-7_25","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T09:03:15Z","timestamp":1477040595000},"page":"259-268","source":"Crossref","is-referenced-by-count":0,"title":["Optimizing Machine Learning based Large Scale Android Malwares Detection by Feature Disposal"],"prefix":"10.1007","author":[{"given":"Lingling","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Min","family":"Lei","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Shiqi","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"25_CR1","doi-asserted-by":"publisher","unstructured":"J. Sahs and L. Khan.: A machine learning approach to android malware detection. In Intelligence and Security Informatics Conference (EISIC). (2012) doi: 10.1109\/EISIC2012.34 .","DOI":"10.1109\/EISIC2012.34"},{"key":"25_CR2","doi-asserted-by":"publisher","unstructured":"Westyarian, Y. Rosmansyah, and B. Dabarsyah.: Malware detection on android smartphones using api class and machine learning. In Electrical Engineering and Informatics (ICEEI). (2015) doi: 10.1109\/ICEEI2015.7352513 .","DOI":"10.1109\/ICEEI2015.7352513"},{"key":"25_CR3","doi-asserted-by":"publisher","unstructured":"S.Y. Yerima, S. Sezer, and I. Muttik.: Android malware detection using parallel machine learning classifiers. In Next Generation Mobile Apps, Services and Technologies (NGMAST). (2014). doi: 10.1109\/NGMAST.2014.23 .","DOI":"10.1109\/NGMAST.2014.23"},{"key":"25_CR4","doi-asserted-by":"publisher","unstructured":"Jit-Ping Siew, Heng-Chin Low, Ping-Chow Teoh.: An interactive mobile learning application using machine learning framework in a flexible manufacturing environment. In Next Generation Mobile Apps, Services and Technologies (NGMAST). (2014). doi: 10.1109\/NGMAST.2014.23 .","DOI":"10.1109\/NGMAST.2014.23"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Javanmardi, S., Shojafar, M., Shariatmadari, S., Ahrabi, S. S. (2015). Frtrust: a fuzzy reputation based model for trust management in semantic p2p grids. International Journal of Grid & Utility Computing, 6(1), 57-66.","DOI":"10.1504\/IJGUC.2015.066397"},{"key":"25_CR6","unstructured":"Brown, M. S., Tarverdian, E., Pelosi, M. (2015). Selection of direct and derived function point estimation methods. International Journal of Grid & Utility Computing, 6(1)."},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Hsu, T. Y., Kshemkalyani, A. D. (2015). Variable social vector clocks for exploring user interactions in social communication networks. International Journal of Space-Based and Situated Computing, 5.","DOI":"10.1504\/IJSSC.2015.067997"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Arour, K., Zammali, S., Bouzeghoub, A. (2015). Test-bed building process for context-aware peer-to-peer information retrieval evaluation. International Journal of Space-Based and Situated Computing, 5(1).","DOI":"10.1504\/IJSSC.2015.067980"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Thomas, A. M., Moore, P., Shah, H., Evans, C., Sharma, M., Xhafa, F., et al. (2013). Smart care spaces: needs for intelligent at-home care. International Journal of Space-Based and Situated Computing, 3(1), 35-44.","DOI":"10.1504\/IJSSC.2013.051988"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49109-7_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T01:47:07Z","timestamp":1498355227000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49109-7_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491080","9783319491097"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49109-7_25","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}