{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:16:39Z","timestamp":1743002199854,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":10,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811501173"},{"type":"electronic","value":"9789811501180"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-15-0118-0_16","type":"book-chapter","created":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T23:03:21Z","timestamp":1568329401000},"page":"207-216","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Integrated Multi-featured Android Malicious Code Detection"],"prefix":"10.1007","author":[{"given":"Qing","family":"Yu","sequence":"first","affiliation":[]},{"given":"Hui","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,13]]},"reference":[{"issue":"3","key":"16_CR1","first-page":"156","volume":"8","author":"H-S Ham","year":"2013","unstructured":"Ham, H.-S., Choi, M.-J.: Analysis of android malware detection performance using machine learning classifiers. Int. Conf. ICT Convergence (ICTC) 8(3), 156\u2013174 (2013)","journal-title":"Int. Conf. ICT Convergence (ICTC)"},{"issue":"22","key":"16_CR2","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.jnca.2013.05.008","volume":"38","author":"SH Seo","year":"2014","unstructured":"Seo, S.H., Gupta, A., Mohamed, S.A.: Detecting mobile malware threats to homeland security through static analysis. J. Netw. Comput. 38(22), 43\u201353 (2014)","journal-title":"J. Netw. Comput."},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Hsu, Y., Lee, D.: Machine learning for implanted malicious code detection with incompletely specified system implementations. In: IEEE International Conference on Network Protocols. IEEE (2011)","DOI":"10.1109\/ICNP.2011.6089070"},{"key":"16_CR4","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-540-74565-5_5","volume-title":"KI 2007: Advances in Artificial Intelligence","author":"Y Elovici","year":"2007","unstructured":"Elovici, Y., Shabtai, A., Moskovitch, R., Tahan, G., Glezer, C.: Applying machine learning techniques for detection of malicious code in network traffic. In: Hertzberg, J., Beetz, M., Englert, R. (eds.) KI 2007. LNCS (LNAI), vol. 4667, pp. 44\u201350. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74565-5_5"},{"key":"16_CR5","unstructured":"Zhao, H.: Implementation and application of android NDK development environment. Comput. Knowl. Technol. 06(35) (2010)"},{"key":"16_CR6","first-page":"115","volume":"12","author":"H Zhouxin","year":"2013","unstructured":"Zhouxin, H., Gongjie, Z.: Selective integrated classification algorithm based on k-fold cross validation. Bull. Sci. Technol. 12, 115\u2013117 (2013)","journal-title":"Bull. Sci. Technol."},{"issue":"10","key":"16_CR7","doi-asserted-by":"publisher","first-page":"1619","DOI":"10.1109\/TPAMI.2006.211","volume":"28","author":"JJ Rodr\u00edguez","year":"2006","unstructured":"Rodr\u00edguez, J.J., Kuncheva, L.I., Alonso, C.J.: Rotation forest: a new classifier ensemble method. IEEE Trans. Pattern Anal. Mach. Intell. 28(10), 1619\u20131630 (2006)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"6","key":"16_CR8","first-page":"68","volume":"36","author":"X Yajing","year":"2006","unstructured":"Yajing, X., Yuanzheng, W.: Improvement of principal component analysis applied method. Pract. Recogn. Math. 36(6), 68\u201375 (2006)","journal-title":"Pract. Recogn. Math."},{"key":"16_CR9","series-title":"Discovering Knowledge in Data: An Introduction to Data Mining","doi-asserted-by":"publisher","DOI":"10.1002\/0471687545.ch5","volume-title":"K-Nearest Neighbor Algorithm","author":"DT Larose","year":"2004","unstructured":"Larose, D.T.: K-Nearest Neighbor Algorithm. Discovering Knowledge in Data: An Introduction to Data Mining. Wiley, Hoboken (2004)"},{"issue":"1","key":"16_CR10","first-page":"104","volume":"25","author":"S Huaping","year":"2006","unstructured":"Huaping, S., Zheng, Y., Chengyu, Y.: Research on SVM algorithm and its application. J. Lanzhou Jiaotong Univ. 25(1), 104\u2013106 (2006)","journal-title":"J. Lanzhou Jiaotong Univ."}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-0118-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T12:25:57Z","timestamp":1709814357000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-0118-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811501173","9789811501180"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-0118-0_16","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"13 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPCSEE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of Pioneering Computer Scientists, Engineers and Educators","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guilin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpcsee2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2019.icpcsee.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}