{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:52:06Z","timestamp":1743033126604,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319744995"},{"type":"electronic","value":"9783319745008"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-74500-8_17","type":"book-chapter","created":{"date-parts":[[2018,3,20]],"date-time":"2018-03-20T00:20:32Z","timestamp":1521505232000},"page":"188-199","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Detection and Classification of Malwares in Mobile Applications"],"prefix":"10.1007","author":[{"given":"Soussi","family":"Ilham","sequence":"first","affiliation":[]},{"given":"Abderrahim","family":"Ghadi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,21]]},"reference":[{"key":"17_CR1","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.cose.2016.01.008","volume":"59","author":"M Junaid","year":"2016","unstructured":"Junaid, M., Liu, D., Kung, D.: Dexteroid: detecting malicious behaviors in Android apps using reverse-engineered life cycle models. Comput. Secur. 59, 92\u2013117 (2016). https:\/\/doi.org\/10.1016\/j.cose.2016.01.008","journal-title":"Comput. Secur."},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Mercaldo, F., Nardone, V., Santone, A., Visaggio, C.A.: Download malware? No, thanks. How formal methods can block update attacks (2016)","DOI":"10.1145\/2897667.2897673"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Yang, L., Chen, L., Jinliang, L.: Adaptive and scalable android malware detection through online learning. ArXiv160607150 Cs (2016)","DOI":"10.1109\/IJCNN.2016.7727508"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Yerima, S.Y., Sezer, S., McWilliams, G., Muttik, I.: A new android malware detection approach using Bayesian classification. In: 2013 IEEE 27th International Conference on Advanced Information Networking and Application (AINA)","DOI":"10.1109\/AINA.2013.88"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Pekta\u015f, A., \u00c7avdar, M., Acarman, T.: Android malware classification by applying online machine learning, pp. 72\u201380 (2016)","DOI":"10.1007\/978-3-319-47217-1_8"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Dash, S., Suarez-Tangil, G., Khan, S., et al.: DroidScribe: classifying android malware based on runtime behavior (2016)","DOI":"10.1109\/SPW.2016.25"},{"key":"17_CR7","doi-asserted-by":"publisher","unstructured":"Jang, J., Yun, J., Mohaisen, A., et al.: Detecting and classifying method based on similarity matching of Android malware behavior with profile. SpringerPlus 5 (2016). https:\/\/doi.org\/10.1186\/s40064-016-1861-x","DOI":"10.1186\/s40064-016-1861-x"},{"key":"17_CR8","doi-asserted-by":"publisher","unstructured":"Malik, S., Khatter, K.: System call analysis of Android malware families. Indian J. Sci. Technol. 9 (2016). https:\/\/doi.org\/10.17485\/ijst\/2016\/v9i21\/90273","DOI":"10.17485\/ijst\/2016\/v9i21\/90273"},{"key":"17_CR9","doi-asserted-by":"publisher","unstructured":"Alzaylaee, M.K., Yerima, S.Y., Sezer, S.: EMULATOR vs. REAL PHONE: Android malware detection using machine learning. ArXiv170310926 Cs, pp. 65\u201372. https:\/\/doi.org\/10.1145\/3041008.3041010","DOI":"10.1145\/3041008.3041010"},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.jpdc.2016.10.012","volume":"103","author":"F Tong","year":"2017","unstructured":"Tong, F., Yan, Z.: A hybrid approach of mobile malware detection in Android. J. Parallel Distrib. Comput. 103, 22\u201331 (2017). https:\/\/doi.org\/10.1016\/j.jpdc.2016.10.012","journal-title":"J. Parallel Distrib. Comput."},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Kapratwar, A.: Static and dynamic analysis for Android malware detection. Masters projects (2016)","DOI":"10.5220\/0006256706530662"}],"container-title":["Lecture Notes in Networks and Systems","Innovations in Smart Cities and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-74500-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,13]],"date-time":"2019-10-13T00:23:04Z","timestamp":1570926184000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-74500-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319744995","9783319745008"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-74500-8_17","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2018]]}}}