{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:16:02Z","timestamp":1742980562677,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341281"},{"type":"electronic","value":"9783642341298"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34129-8_20","type":"book-chapter","created":{"date-parts":[[2012,10,17]],"date-time":"2012-10-17T11:15:22Z","timestamp":1350472522000},"page":"228-239","source":"Crossref","is-referenced-by-count":8,"title":["Permission-Based Abnormal Application Detection for Android"],"prefix":"10.1007","author":[{"given":"Jiawei","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Zhi","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Liangwen","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Huiping","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Zhong","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"G.\u00a0Inc., \n                      \n                        https:\/\/play.google.com\/store"},{"key":"20_CR2","unstructured":"(June 5, 2012), \n                      \n                        http:\/\/www.appbrain.com\/stats\/number-of-android-apps\/"},{"key":"20_CR3","unstructured":"Enck, W., Gilbert, P., Chun, B., Cox, L., Jung, J., McDaniel, P., Sheth, A.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, pp. 1\u20136. USENIX Association (2010)"},{"key":"20_CR4","unstructured":"Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of android application security. In: Proceedings of the 20th USENIX Security Symposium (August 2011)"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 235\u2013245. ACM (2009)","DOI":"10.1145\/1653662.1653691"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Portokalidis, G., Homburg, P., Anagnostakis, K., Bos, H.: Paranoid android: versatile protection for smartphones. In: Proc. 26th Annual Computer Security Applications Conference (2010)","DOI":"10.1145\/1920261.1920313"},{"key":"20_CR7","unstructured":"Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In: Proceedings of the 19th Annual Network and Distributed System Security Symposium (2012)"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 15\u201326. ACM (2011)","DOI":"10.1145\/2046614.2046619"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Lewis, D., Gale, W.: A sequential algorithm for training text classifiers. In: Proceedings of the 17th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 3\u201312. Springer-Verlag New York, Inc. (1994)","DOI":"10.1007\/978-1-4471-2099-5_1"},{"key":"20_CR10","unstructured":"McCallum, A., Nigam, K.: A comparison of event models for naive bayes text classification. In: AAAI 1998 Workshop on Learning for Text Categorization, vol.\u00a0752, pp. 41\u201348 (1998)"},{"key":"20_CR11","unstructured":"G.\u00a0Inc., \n                      \n                        http:\/\/developer.android.com\/reference\/android\/Manifest.permission.html"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Barrera, D., Kayacik, H., van Oorschot, P., Somayaji, A.: A methodology for empirical analysis of permission-based security models and its application to android. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 73\u201384. ACM (2010)","DOI":"10.1145\/1866307.1866317"},{"issue":"7","key":"20_CR13","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1016\/S0031-3203(96)00142-2","volume":"30","author":"A. Bradley","year":"1997","unstructured":"Bradley, A.: The use of the area under the roc curve in the evaluation of machine learning algorithms. Pattern Recognition\u00a030(7), 1145\u20131159 (1997)","journal-title":"Pattern Recognition"},{"key":"20_CR14","unstructured":"Symantec (Februbary 28, 2011), \n                      \n                        http:\/\/www.symantec.com\/connect\/blogs\/android-threats-getting-steamy"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34129-8_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:21:10Z","timestamp":1566764470000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34129-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341281","9783642341298"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34129-8_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}