{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:06:51Z","timestamp":1742976411229,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545672"},{"type":"electronic","value":"9783642545689"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54568-9_17","type":"book-chapter","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T14:31:35Z","timestamp":1395325895000},"page":"268-283","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Classifying Android Malware through Subgraph Mining"],"prefix":"10.1007","author":[{"given":"Fabio","family":"Martinelli","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andrea","family":"Saracino","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Daniele","family":"Sgandurra","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,3,21]]},"reference":[{"key":"17_CR1","series-title":"LNCS","first-page":"240","volume-title":"MMM-ACNS 2012","author":"G Dini","year":"2012","unstructured":"Dini, G., Martinelli, F., Saracino, A., Sgandurra, D.: MADAM: a multi-level anomaly detector for android malware. In: Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2012. LNCS, vol. 7531, pp. 240\u2013253. Springer, Heidelberg (2012)"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Aldini, A., Martinelli, F., Saracino, A., Sgandurra, D.: A collaborative framework for generating probabilistic contracts. In: Smari, W.W., Fox, G.C. (eds.): Proceedings of the 2013 IEEE International Conference on Collaboration Technologies and Systems, SECOTS 2013, pp. 139\u2013143. IEEE Computer Society (2013)","DOI":"10.1109\/CTS.2013.6567219"},{"key":"17_CR3","unstructured":"Philippsen, M.: Parsemis: the parallel and sequential mining suite. http:\/\/www2.informatik.uni-erlangen.de\/EN\/research\/ParSeMiS"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Burguera, I., Zurutuza, U., Nadijm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: SPSM \u201911, October 2011. ACM (2011)","DOI":"10.1145\/2046614.2046619"},{"issue":"1","key":"17_CR5","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/1127345.1127348","volume":"9","author":"D Mutz","year":"2006","unstructured":"Mutz, D., Valeur, F., Vigna, G.: Anomalous system call detection. ACM Trans. Inf. Syst. Secur. 9(1), 61\u201393 (2006)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"1","key":"17_CR6","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s10844-010-0148-x","volume":"38","author":"A Shabtai","year":"2012","unstructured":"Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: \u201cAndromaly\u201d: a behavioral malware detection framework for android devices. J. Intell. Inf. Syst. 38(1), 161\u2013190 (2012)","journal-title":"J. Intell. Inf. Syst."},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Blasing, T., Batyuk, L., Schmidt, A.D., Camtepe, S., Albayrak, S.: An android application sandbox system for suspicious software detection. In: 2010 5th International Conference on Malicious and Unwanted Software (MALWARE), pp. 55\u201362 (2010)","DOI":"10.1109\/MALWARE.2010.5665792"},{"key":"17_CR8","unstructured":"Reina, A., Fattori, A., Cavallaro, L.: A system call-centric analysis and stimulation technique to automatically reconstruct android malware behaviors. In: Proceedings of the 6th European Workshop on System Security (EUROSEC), Prague, Czech Republic, April 2013 (2013)"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Zheng, M., Sun, M., Lui, J.C.: Droidanalytics: a signature based analytic system to collect, extract, analyze and associate android malware. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 13), Melbourne, Australia, July 2013 (2013)","DOI":"10.1109\/TrustCom.2013.25"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Barrera, D., Kayacik, H.G., van Oorschot, P.C., Somayaji, A.: A methodology for empirical analysis of permission-based security models and its application to android. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS \u201910, pp. 73\u201384. ACM, New York (2010)","DOI":"10.1145\/1866307.1866317"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X., Bringas, P.: On the automatic categorisation of android applications. In: 2012 IEEE Consumer Communications and Networking Conference (CCNC), pp. 149\u2013153 (2012)","DOI":"10.1109\/CCNC.2012.6181075"},{"key":"17_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12083-011-0101-y","volume":"5","author":"D Damopoulos","year":"2012","unstructured":"Damopoulos, D., Kambourakis, G., Gritzalis, S., Park, S.: Peer-to-Peer Netw. Appl. 5, 1\u201311 (2012)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: CCS \u201909: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 235\u2013245. ACM, New York (2009)","DOI":"10.1145\/1653662.1653691"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Ongtang, M., McLaughlin, S., Enck, W., McDaniel, P.: Semantically rich application-centric security in android. In: Proceedings of the 2009 Annual Computer Security Applications Conference, ACSAC \u201909, December 2009, pp. 340\u2013349 (2009)","DOI":"10.1109\/ACSAC.2009.39"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Schmidt, A.D., Bye, R., Schmidt, H.G., Clausen, J.H., Kiraz, O., Y\u00fcksel, K.A., \u00c7amtepe, S.A., Albayrak, S.: Static analysis of executables for collaborative malware detection on android. In: Proceedings of IEEE International Conference on Communications, ICC 2009, Dresden, Germany, 14\u201318 June 2009, pp. 1\u20135. IEEE (2009)","DOI":"10.1109\/ICC.2009.5199486"},{"issue":"1","key":"17_CR16","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1109\/SURV.2012.013012.00028","volume":"15","author":"M La Polla","year":"2013","unstructured":"La Polla, M., Martinelli, F., Sgandurra, D.: A survey on security for mobile devices. IEEE Commun. Surv. Tutorials 15(1), 446\u2013471 (2013)","journal-title":"IEEE Commun. Surv. Tutorials"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54568-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T12:16:47Z","timestamp":1676377007000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-54568-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545672","9783642545689"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54568-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"21 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}