{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T04:08:47Z","timestamp":1749874127159,"version":"3.41.0"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319519654"},{"type":"electronic","value":"9783319519661"}],"license":[{"start":{"date-parts":[[2016,12,29]],"date-time":"2016-12-29T00:00:00Z","timestamp":1482969600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-51966-1_1","type":"book-chapter","created":{"date-parts":[[2016,12,28]],"date-time":"2016-12-28T11:11:08Z","timestamp":1482923468000},"page":"3-19","source":"Crossref","is-referenced-by-count":1,"title":["MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes"],"prefix":"10.1007","author":[{"given":"Antonio","family":"La Marra","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Saracino","sequence":"additional","affiliation":[]},{"given":"Mina","family":"Sheikhalishahi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,12,29]]},"reference":[{"key":"1_CR1","unstructured":"Sophos mobile security threat reports (2014). http:\/\/www.sophos.com\/en-us\/threat-center\/mobile-security-threat-report.aspx . Accessed 21 July 2017"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Alishahi, M.S., Mejri, M., Tawbi, N.: Clustering spam emails into campaigns. In: ICISSP 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9\u201311 February 2015, pp. 90\u201397 (2015)","DOI":"10.5220\/0005244500900097"},{"issue":"4","key":"1_CR3","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1007\/s10791-008-9066-8","volume":"12","author":"E Amig\u00f3","year":"2009","unstructured":"Amig\u00f3, E., Gonzalo, J., Artiles, J., Verdejo, F.: A comparison of extrinsic clustering evaluation metrics based on formal constraints. Inf. Retr. 12(4), 461\u2013486 (2009)","journal-title":"Inf. Retr."},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., H\u00fcbner, M., Gascon, H., Rieck, K.: Drebin: effective and explainable detection of android malware in your pocket. In: Proceedings of NDSS (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"1_CR5","unstructured":"Bayer, U., Comparetti, P.M., Hlauschek, C., Kruegel, C., Kirda, E.: Scalable, behavior-based malware clustering. In: NDSS, vol. 9, pp. 8\u201311. Citeseer (2009)"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Canfora, G., Lorenzo, A.D., Medvet, E., Mercaldo, F., Visaggio, C.A.: Effectiveness of opcode ngrams for detection of multi family android malware. In: 10th International Conference on Availability, Reliability and Security, ARES 2015, Toulouse, France, 24\u201327 August 2015, pp. 333\u2013340 (2015)","DOI":"10.1109\/ARES.2015.57"},{"key":"1_CR7","unstructured":"Christian Funk, M.G.: Kaspersky security bullettin 2013, December 2013. http:\/\/media.kaspersky.com\/pdf\/KSB_2013_EN.pdf"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A., Sgandurra, D.: Evaluating the trust of android applications through an adaptive and distributed multi-criteria approach. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1541\u20131546, July 2013","DOI":"10.1109\/TrustCom.2013.189"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Dini, G., Martinelli, F., Saracino, A., Sgandurra, D.: MADAM: a multi-level anomaly detector for android malware. In: Proceedings of Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, 17\u201319 October 2012, pp. 240\u2013253 (2012)","DOI":"10.1007\/978-3-642-33704-8_21"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, 17\u201321 October 2011, pp. 627\u2013638 (2011)","DOI":"10.1145\/2046707.2046779"},{"issue":"4","key":"1_CR11","doi-asserted-by":"crossref","first-page":"734","DOI":"10.1109\/TKDE.2012.35","volume":"25","author":"S Garcia","year":"2013","unstructured":"Garcia, S., Luengo, J., Saez, J.A., Lopez, V., Herrera, F.: A survey of discretization techniques: taxonomy and empirical analysis in supervised learning. IEEE Trans. Knowl. Data Eng. 25(4), 734\u2013750 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1_CR12","volume-title":"Data Mining: Concepts and Techniques","author":"J Han","year":"2011","unstructured":"Han, J., Kamber, M., Pei, J.: Data Mining: Concepts and Techniques, 3rd edn. Morgan Kaufmann Publishers Inc., San Francisco (2011)","edition":"3"},{"key":"1_CR13","unstructured":"Kerber, R.: Chimerge: discretization of numeric attributes. In: Proceedings of the Tenth National Conference on Artificial Intelligence, AAAI 1992, pp. 123\u2013128. AAAI Press (1992)"},{"key":"1_CR14","unstructured":"Kindsight Security Labs: Kindsight security labs malware report h1 2014 (2014). http:\/\/resources.alcatel-lucent.com\/?cid=180437"},{"issue":"1","key":"1_CR15","first-page":"81","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan, J.R.: Induction of decision trees. Mach. Learn. 1(1), 81\u2013106 (1986). http:\/\/dx.doi.org\/10.1023\/A:1022643204877","journal-title":"Mach. Learn."},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Salvador, S., Chan, P.: Determining the number of clusters\/segments in hierarchical clustering\/segmentation algorithms. In: Proceedings of the 16th IEEE International Conference on Tools with Artificial Intelligence, ICTAI 2004, pp. 576\u2013584. IEEE Computer Society, Washington, DC (2004)","DOI":"10.1109\/ICTAI.2004.50"},{"key":"1_CR17","unstructured":"Saracino, A., Sgandurra, D., Dini, G., Martinelli, F.: Madam: effective and efficient behavior-based android malware detection and prevention. IEEE Tran. Dependable Secure Comput. (2016)"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-24858-5_1","volume-title":"Security and Trust Management","author":"M Sheikhalishahi","year":"2015","unstructured":"Sheikhalishahi, M., Saracino, A., Mejri, M., Tawbi, N., Martinelli, F.: Digital waste sorting: a goal-based, self-learning approach to label spam email campaigns. In: Foresti, S. (ed.) STM 2015. LNCS, vol. 9331, pp. 3\u201319. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-24858-5_1"},{"key":"1_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-319-30303-1_12","volume-title":"Foundations and Practice of Security","author":"M Sheikhalishahi","year":"2016","unstructured":"Sheikhalishahi, M., Saracino, A., Mejri, M., Tawbi, N., Martinelli, F.: Fast and effective clustering of spam emails based on structural similarity. In: Garcia-Alfaro, J., Kranakis, E., Bonfante, G. (eds.) FPS 2015. LNCS, vol. 9482, pp. 195\u2013211. Springer, Heidelberg (2016). doi: 10.1007\/978-3-319-30303-1_12"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, M., Duan, Y., Yin, H., Zhao, Z.: Semantics-aware android malware classification using weighted contextual API dependency graphs. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS 2014, New York, NY, USA, pp. 1105\u20131116. ACM (2014)","DOI":"10.1145\/2660267.2660359"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP 2012, pp. 95\u2013109. IEEE Computer Society, Washington, DC (2012)","DOI":"10.1109\/SP.2012.16"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-51966-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T22:52:28Z","timestamp":1749855148000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-51966-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,29]]},"ISBN":["9783319519654","9783319519661"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-51966-1_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016,12,29]]}}}