{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:05:26Z","timestamp":1725905126270},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319633084"},{"type":"electronic","value":"9783319633091"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-63309-1_71","type":"book-chapter","created":{"date-parts":[[2017,7,19]],"date-time":"2017-07-19T10:09:09Z","timestamp":1500458949000},"page":"796-807","source":"Crossref","is-referenced-by-count":1,"title":["Android Malware Clustering Analysis on Network-Level Behavior"],"prefix":"10.1007","author":[{"given":"Shanshan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zhenxiang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xiaomei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Chuan","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,20]]},"reference":[{"key":"71_CR1","unstructured":"Google play: number of available apps 2009\u20132016. http:\/\/www.statista.com\/statistics\/266210\/"},{"key":"71_CR2","unstructured":"Report: 2016 saw 8.5 million mobile malware attacks, ransomware and IoT threats on the rise. http:\/\/www.techrepublic.com\/article\/report-2016-saw-8-5-millionmobile-malware-attacks-ransomware-and-iot-threats-on-the-rise\/"},{"key":"71_CR3","doi-asserted-by":"crossref","unstructured":"Enck, W., et al.: On lightweight mobile phone application certification (2009)","DOI":"10.1145\/1653662.1653691"},{"key":"71_CR4","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Chin, E., Hanna, S., et al.: Android permissions demystified. In: ACM Conference on Computer and Communications Security, pp. 627\u2013638. ACM (2011)","DOI":"10.1145\/2046707.2046779"},{"key":"71_CR5","doi-asserted-by":"crossref","unstructured":"Grace, M., Zhou, Y., Zhang, Q., et al.: RiskRanker: scalable and accurate zero-day android malware detection. In: International Conference on Mobile Systems, Applications, and Services, pp. 281\u2013294. ACM (2012)","DOI":"10.1145\/2307636.2307663"},{"key":"71_CR6","doi-asserted-by":"crossref","unstructured":"Moser, A., Kruegel, C., Kirda, E.: Limits of static analysis for malware detection. In: Twenty-Third Annual Conference on Computer Security Applications, ACSAC 2007, pp. 421\u2013430. IEEE Xplore (2008)","DOI":"10.1109\/ACSAC.2007.21"},{"key":"71_CR7","unstructured":"Enck, W., Gilbert, P., Han, S., et al.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Usenix Symposium on Operating Systems Design and Implementation, OSDI 2010 Proceedings, 4\u20136 October 2010, Vancouver, BC, Canada, pp. 393\u2013407. DBLP (2010)"},{"key":"71_CR8","unstructured":"Zhou, Y., Wang, Z., Zhou, W., et al.: Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. In: Proceedings of Annual Network & Distributed System Security Symposium (2012)"},{"key":"71_CR9","unstructured":"Yan, L.K., Yin, H.: DroidScope: seamlessly reconstructing the OS and dalvik semantic views for dynamic android malware analysis. In: Usenix Security Symposium, pp. 569\u2013584 (2012)"},{"key":"71_CR10","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: Security and Privacy, pp. 95\u2013109. IEEE (2012)","DOI":"10.1109\/SP.2012.16"},{"key":"71_CR11","doi-asserted-by":"crossref","unstructured":"Cao, D., Wang, S., Li, Q., Cheny, Z., Yan, Q., Peng, L., Yang, B.: Droidcollector: a high performance framework for high quality android traffic collection. In: 2016 IEEE Trustcom\/BigDataSE\/ISPA, August 2016, pp. 1753\u20131758 (2016)","DOI":"10.1109\/TrustCom.2016.0269"},{"key":"71_CR12","doi-asserted-by":"crossref","unstructured":"Arora, A., Garg, S., Peddoju, S.K.: Malware detection using network traffic analysis in android based mobile devices. In: Eighth International Conference on Next Generation Mobile Apps, Services and Technologies, pp. 66\u201371. IEEE (2014)","DOI":"10.1109\/NGMAST.2014.57"},{"key":"71_CR13","unstructured":"Virusshare.com. https:\/\/virusshare.com\/"},{"key":"71_CR14","doi-asserted-by":"crossref","unstructured":"Bailey, M., Oberheide, J., Andersen, J., et al.: Automated classification and analysis of internet malware. In: International Conference on Recent Advances in Intrusion Detection, pp. 178\u2013197. Springer-Verlag (2007)","DOI":"10.1007\/978-3-540-74320-0_10"},{"key":"71_CR15","unstructured":"Bayer, U., Comparetti, P.M., Hlauschek, C., et al.: Scalable, behavior-based malware clustering. In: Network and Distributed System Security Symposium, NDSS 2009, February 2009, San Diego, California, USA. DBLP (2009)"},{"key":"71_CR16","unstructured":"Li, Z., Sanghi, M., Chen, Y., et al.: Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack Resilience, p. 47 (2006)"},{"key":"71_CR17","doi-asserted-by":"crossref","unstructured":"Newsome, J., Karp, B., Song, D.: Polygraph: automatically generating signatures for polymorphic worms. In: IEEE Symposium on Security & Privacy, pp. 226\u2013241. IEEE (2005)","DOI":"10.1109\/SP.2005.15"},{"key":"71_CR18","doi-asserted-by":"crossref","unstructured":"Xie, Y., Yu, F., Achan, K., et al.: Spamming botnets: signatures and characteristics. In: ACM SIGCOMM Computer Communication Review, pp. 171\u2013182 (2008)","DOI":"10.1145\/1402958.1402979"},{"key":"71_CR19","doi-asserted-by":"crossref","unstructured":"Xu, Q., Liao, Y., Miskovic, S., et al.: Automatic generation of mobile app signatures from traffic observations. In: Computer Communications, pp. 1481\u20131489. IEEE (2015)","DOI":"10.1109\/INFOCOM.2015.7218526"},{"key":"71_CR20","doi-asserted-by":"crossref","unstructured":"Aresu, M., Ariu, D., Ahmadi, M., et al.: Clustering android malware families by http traffic. In: International Conference on Malicious and Unwanted Software, pp. 128\u2013135 (2015)","DOI":"10.1109\/MALWARE.2015.7413693"},{"key":"71_CR21","unstructured":"TSNE. http:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.manifold.TSNE.html"},{"key":"71_CR22","doi-asserted-by":"crossref","unstructured":"Luan, S., Kong, X., Wang, B., et al.: Silhouette coefficient based approach on cellphone classification for unknown source imagee. In: IEEE International Conference on Communications, pp. 6744\u20136747. IEEE (2012)","DOI":"10.1109\/ICC.2012.6364928"}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Theories and Application"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-63309-1_71","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,30]],"date-time":"2019-09-30T22:49:20Z","timestamp":1569883760000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-63309-1_71"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319633084","9783319633091"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-63309-1_71","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}