{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:12:47Z","timestamp":1761621167650,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":15,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789401787970"},{"type":"electronic","value":"9789401787987"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-94-017-8798-7_68","type":"book-chapter","created":{"date-parts":[[2014,4,18]],"date-time":"2014-04-18T05:40:19Z","timestamp":1397799619000},"page":"575-585","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Linear SVM-Based Android Malware Detection"],"prefix":"10.1007","author":[{"given":"Hyo-Sik","family":"Ham","sequence":"first","affiliation":[]},{"given":"Hwan-Hee","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Myung-Sup","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Mi-Jung","family":"Choi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,4,19]]},"reference":[{"key":"68_CR1","unstructured":"F-Secure (2012) \u201cMobile threat report\u201d Q4 2012"},{"key":"68_CR2","unstructured":"Schmidt AD, Camtepe A, Albayrak S (2010) Static smartphone malware detection. In: Proceedings of the 5th security research conference (future security 2010), p 146. ISBN: 978-3-8396-0159-4"},{"key":"68_CR3","doi-asserted-by":"crossref","unstructured":"Bl\u00e4sing T, Schmidt AD, Batyuk L, Camtepe SA, Albayrak S (2010) An android application sandbox system for suspicious software detection. In: 5th international conference on malicious and unwanted software (MALWARE\u20192010), Nancy, France","DOI":"10.1109\/MALWARE.2010.5665792"},{"key":"68_CR4","doi-asserted-by":"crossref","unstructured":"Kou X, Wen Q (2011) Intrusion detection model based on android. In: 4th IEEE international conference on broadband network and multimedia technology (IC-BNMT), pp 624\u2013628","DOI":"10.1109\/ICBNMT.2011.6156010"},{"key":"68_CR5","doi-asserted-by":"crossref","unstructured":"Bose A, Hu X, Shin KG, Park T (2008) Behavioral detection of malware on mobile handsets. In: Proceedings of the 6th international conference on mobile systems, applications, and services, MobiSys \u201808","DOI":"10.1145\/1378600.1378626"},{"key":"68_CR6","unstructured":"Schmidt AD, Schmidt HG, Clausen J, Y\u01d6ksel KA, Kiraz O, Camtepe A, Albayrak S (2008) Enhancing security of linux-based android devices. In: Proceedings of 15th international Linux kongress, Lehmann"},{"key":"68_CR7","doi-asserted-by":"crossref","unstructured":"Cheng J, Wong SHY, Yang H, Lu S (2007) SmartSiren virus detection and alert for S-martphones. In: Proceedings of the 5th international conference on mobile systems, applications and services, MobiSys \u201807","DOI":"10.1145\/1247660.1247690"},{"key":"68_CR8","doi-asserted-by":"crossref","unstructured":"Liu L, Yan G, Zhang X, Chen S (2009) Virusmeter preventing your cellphone from spies. Recent advances in intrusion detection lecture notes in computer science, vol 5758\/2009, pp 244\u2013264","DOI":"10.1007\/978-3-642-04342-0_13"},{"key":"68_CR9","doi-asserted-by":"crossref","unstructured":"Burguera I, Zurutuza U, Nadjm-Tehrani S (2011) Crowdroid behavior-based malware detection system. In: Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices, SPSM \u201811","DOI":"10.1145\/2046614.2046619"},{"key":"68_CR10","doi-asserted-by":"crossref","unstructured":"Shabtai A, Kanonov U, Elovici Y, Glezer C, Weiss Y (2012) \u201cAndromaly\u201d a behavioral malware detection framework for android devices. J Intell Inf Syst 38","DOI":"10.1007\/s10844-010-0148-x"},{"key":"68_CR11","unstructured":"Fuchs AP, Chaudhuri A, Foster JS (2011) ScanDroid: automated security certification of android applications"},{"key":"68_CR12","unstructured":"Enck W, Gilbert P, Chun BG, Cox LP, Jung J, McDaniel P, Sheth A (2010) TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX conference on operating systems design and implementation, OSDI\u201910"},{"key":"68_CR13","unstructured":"Burgesm CJC (1998) A tutorial on support vector machines for pattern recognition. Submitted to data mining and knowledge discovery. http:\/\/svm.research.bell-labs.com\/SVMdochtml"},{"key":"68_CR14","unstructured":"Ham HS, Choi MJ (2013) Analysis of android malware detection performance using machine learning classifiers. In: International conference on ICT convergence"},{"key":"68_CR15","unstructured":"Kim T, Choi Y, Han S, Chung JY, Hyun J, Li J, Hong JW (2012) Monitoring and detecting abnormal behavior in mobile cloud infrastructure. In: IEEE\/IFIP international workshop on cloud management (CloudMan 2012), pp 1303\u20131310, Maui, Hawaii, USA, 20 Apr 2012"}],"container-title":["Lecture Notes in Electrical Engineering","Frontier and Innovation in Future Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-017-8798-7_68","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T15:25:52Z","timestamp":1676388352000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-94-017-8798-7_68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9789401787970","9789401787987"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-94-017-8798-7_68","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"19 April 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}