{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:51:40Z","timestamp":1725882700175},"publisher-location":"Singapore","reference-count":13,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811031526"},{"type":"electronic","value":"9789811031533"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3153-3_5","type":"book-chapter","created":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T03:13:59Z","timestamp":1489634039000},"page":"39-49","source":"Crossref","is-referenced-by-count":10,"title":["Comparative Analysis of Different Feature Ranking Techniques in Data Mining-Based Android Malware Detection"],"prefix":"10.1007","author":[{"given":"Abhishek","family":"Bhattacharya","sequence":"first","affiliation":[]},{"given":"Radha Tamal","family":"Goswami","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,17]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"I. Burquera, U. Zurutuza, and S. Nadjm-Tehrani: Crowdroid: behavior-based malware detection system for Android. In: 1st ACM workshop on Security and privacy in smartphones and mobile devices, 2011, pp. 15\u201326, 2011.","DOI":"10.1145\/2046614.2046619"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"W. Xu, F. Zhang, S. Zhu: Permlyzer: Analyzing permission usage in Android applications. In: IEEE International Symposium on Software reliability Engineering (ISSRE), pp. 400\u2013410 (2013).","DOI":"10.1109\/ISSRE.2013.6698893"},{"key":"5_CR3","unstructured":"B. Sanz,\u00a0I. Santos,\u00a0X. U. Pedrero,\u00a0C. Laorden,\u00a0J. Nieves, P. Garcia Bringas: Instance-based Anomaly Method for Android Malware Detection. SECRYPT, SciTePress, pp. 387\u2013394 (2013)."},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"S.Y.\u00a0Yerima, S Sezer, G. McWilliams: A new android malware detection using Bayesian classification. In: 27th IEEE International Conference on Advanced Information Networking and Applications (AINA), pp. 121\u2013128 (2013).","DOI":"10.1109\/AINA.2013.88"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"A. M. Aswini,\u00a0P. Vinod: Android Malware Analysis Using Ensemble Features. Security, Privacy, and Applied Cryptography Engineering Lecture Notes in Computer Science, vol. 8804, pp. 303\u2013318 (2014).","DOI":"10.1007\/978-3-319-12060-7_20"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"A. M. Aswini,\u00a0P. Vinod: Droid Permission Miner: Mining Prominent Permissions for Android Malware Analysis. In: 5th International Conference on the Applications of the Digital Information and Web Technologies (ICADIWAT), pp. 81\u201386 (2014).","DOI":"10.1109\/ICADIWT.2014.6814679"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"S.Y.\u00a0Yerima, S Sezer, G. McWilliams, I. Muttik: Analysis of Bayesian classification-based approaches for Android malware detection. IET Information Security,\u00a0vol. 8, issue 1, pp. 25\u201336 (2014).","DOI":"10.1049\/iet-ifs.2013.0095"},{"key":"5_CR8","unstructured":"Androguard Project in Google Code Archive, https:\/\/code.google.com\/p\/androguard ."},{"key":"5_CR9","unstructured":"Y. Aafer, W. Du, H. Yin: DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android. Lecture Notes on Security and Privacy in Communication Networks, vol. 127, pp. 86\u2013103, Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (2013)."},{"key":"5_CR10","unstructured":"Z. Aung, W. Zaw: Permission-Based Android Malware Detection. International Journal Of Scientific & Technology Research, vol. 2, issue 3, pp. 228\u2013234 (2013)."},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"S.Y.\u00a0Yerima, S Sezer, G. McWilliams, I. Muttik: High Accuracy Android malware detection Using Ensemble Learning. IET Information Security,\u00a0vol. 9, issue 6, pp. 313\u2013320 (2015).","DOI":"10.1049\/iet-ifs.2014.0099"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"W. Wang, X. Wang,\u00a0D. Feng,\u00a0J. Liu,\u00a0Z. Han,\u00a0X. Zhang: Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection. IEEE Transactions on Information Forensics and Security, vol. 9, issue 11, pp. 1869\u20131882 (2014).","DOI":"10.1109\/TIFS.2014.2353996"},{"key":"5_CR13","unstructured":"K. Allix, T. F. D. A. Bissyande, J. Klein, and Y. Le Traon: Machine Learning-Based Malware Detection for Android Applications: History Matters!. Technical Report, University of Luxembourg, pp. 1\u201317 (2014)."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3153-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T08:44:00Z","timestamp":1498380240000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3153-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811031526","9789811031533"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3153-3_5","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}