{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:22:00Z","timestamp":1774369320840,"version":"3.50.1"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,11,9]],"date-time":"2014-11-09T00:00:00Z","timestamp":1415491200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1007\/s00500-014-1511-6","type":"journal-article","created":{"date-parts":[[2014,11,13]],"date-time":"2014-11-13T15:00:07Z","timestamp":1415890807000},"page":"343-357","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":300,"title":["Evaluation of machine learning classifiers for mobile malware detection"],"prefix":"10.1007","volume":"20","author":[{"given":"Fairuz Amalina","family":"Narudin","sequence":"first","affiliation":[]},{"given":"Ali","family":"Feizollah","sequence":"additional","affiliation":[]},{"given":"Nor Badrul","family":"Anuar","sequence":"additional","affiliation":[]},{"given":"Abdullah","family":"Gani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,9]]},"reference":[{"key":"1511_CR1","doi-asserted-by":"crossref","unstructured":"Amos B, Turner H, White J (2013) Applying machine learning classifiers to dynamic android malware detection at scale. In: Proceedings of the 9th international wireless communications and mobile computing conference (IWCMC), Sardinia, Italy, pp 1666\u20131671","DOI":"10.1109\/IWCMC.2013.6583806"},{"key":"1511_CR2","unstructured":"Android (2013) Android 4.2, Jelly Bean. http:\/\/www.android.com\/about\/jelly-bean\/ . Accessed June 2013"},{"issue":"2","key":"1511_CR3","doi-asserted-by":"crossref","first-page":"101","DOI":"10.22452\/mjcs.vol21no2.3","volume":"21","author":"NB Anuar","year":"2008","unstructured":"Anuar NB, Sallehudin H, Gani A, Zakaria O (2008) Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree. Malays J Comput Sci 21(2):101\u2013115","journal-title":"Malays J Comput Sci"},{"key":"1511_CR4","unstructured":"Anubis (2013) Anubis: analyzing unknown binaries. http:\/\/anubis.iseclab.org\/ . Accessed Feb 2013"},{"key":"1511_CR5","doi-asserted-by":"crossref","unstructured":"Arp D, Spreitzenbarth M, Hubner M, Gascon H, Rieck K (2014) DREBIN: effective and explainable detection of android malware in your pocket. In: Proceedings of the 2014 network and distributed system security (NDSS) symposium, San Diego, USA (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"1511_CR6","unstructured":"Arstechnica (2013) More BadNews for android: new malicious apps found in google play. http:\/\/arstechnica.com\/security\/2013\/04\/more-badnews-for-android-new-malicious-apps-found-in-google-play\/ . Accessed 1st Jan 2013"},{"issue":"7","key":"1511_CR7","doi-asserted-by":"crossref","first-page":"1145","DOI":"10.1016\/S0031-3203(96)00142-2","volume":"30","author":"AP Bradley","year":"1997","unstructured":"Bradley AP (1997) The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recognit 30(7):1145\u20131159","journal-title":"Pattern Recognit"},{"issue":"1","key":"1511_CR8","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u201332","journal-title":"Mach Learn"},{"key":"1511_CR9","doi-asserted-by":"crossref","unstructured":"Burguera I, Zurutuza U, Nadjm-Tehrani S (2011) Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices, Chicago, pp 15\u201326","DOI":"10.1145\/2046614.2046619"},{"key":"1511_CR10","doi-asserted-by":"crossref","unstructured":"Burguera I, Zurutuza U, Nadjm-Tehrani S (2011) Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices, Chicago, USA, pp 15\u201326","DOI":"10.1145\/2046614.2046619"},{"issue":"10","key":"1511_CR11","doi-asserted-by":"crossref","first-page":"9087","DOI":"10.1016\/j.eswa.2012.02.036","volume":"39","author":"D-I Curiac","year":"2012","unstructured":"Curiac D-I, Volosencu C (2012) Ensemble based sensing anomaly detection in wireless sensor networks. Exp Syst Appl 39(10):9087\u20139096","journal-title":"Exp Syst Appl"},{"key":"1511_CR12","doi-asserted-by":"crossref","unstructured":"Dini G, Martinelli F, Saracino A, Sgandurra D (2012) MADAM: a multi-level anomaly detector for android malware. In: Proceedings of the 6th international conference on mathematical methods, models and architectures for computer network security (MMM-ACNS 2012), Saint Petersburg, Russia, pp 240\u2013253","DOI":"10.1007\/978-3-642-33704-8_21"},{"issue":"2","key":"1511_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2089125.2089126","volume":"44","author":"M Egele","year":"2008","unstructured":"Egele M, Scholte T, Kirda E, Kruegel C (2008) A survey on automated dynamic malware-analysis techniques and tools. ACM Comput Surv 44(2):1\u201342","journal-title":"ACM Comput Surv"},{"issue":"3","key":"1511_CR14","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.jvlc.2012.02.002","volume":"23","author":"M Eskandari","year":"2012","unstructured":"Eskandari M, Hashemi S (2012) A graph mining approach for detecting unknown malwares. J Vis Lang Comput 23(3):154\u2013162","journal-title":"J Vis Lang Comput"},{"issue":"8","key":"1511_CR15","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2006","unstructured":"Fawcett T (2006) An introduction to ROC analysis. Pattern Recognit Lett 27(8):861\u2013874","journal-title":"Pattern Recognit Lett"},{"key":"1511_CR16","doi-asserted-by":"crossref","unstructured":"Felt AP, Finifter M, Chin E, Hanna S, Wagner D (2011) A survey of mobile malware in the wild. In: Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices, Chicago, Illinois, USA, pp 3\u201314","DOI":"10.1145\/2046614.2046618"},{"issue":"2\u20133","key":"1511_CR17","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1023\/A:1007465528199","volume":"29","author":"N Friedman","year":"1997","unstructured":"Friedman N, Geiger D, Goldszmidt M (1997) Bayesian network classifiers. Mach Learn 29(2\u20133):131\u2013163","journal-title":"Mach Learn"},{"key":"1511_CR18","unstructured":"F-Secure (2013) Android accounted for 79% of all mobile malware in 2012, 96% in Q4 alone. http:\/\/techcrunch.com\/2013\/03\/07\/f-secure-android-accounted-for-79-of-all-mobile-malware-in-2012-96-in-q4-alone\/ . Accessed 1st June 2013"},{"issue":"1\u20132","key":"1511_CR19","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garc\u00eda-Teodoro","year":"2009","unstructured":"Garc\u00eda-Teodoro P, D\u00edaz-Verdejo J, Maci\u00e1-Fern\u00e1ndez G, V\u00e1zquez E (2009) Anomaly-based network intrusion detection: techniques, systems and challenges. Comput Secur 28(1\u20132):18\u201328","journal-title":"Comput Secur"},{"key":"1511_CR20","doi-asserted-by":"crossref","unstructured":"Gogoi P, Bhattacharyya DK, Borah B, Kalita JK (2013) MLH-IDS: a multi-level hybrid intrusion detection method. Comput J 2013 doi: 10.1093\/comjnl\/bxt044 . Online. http:\/\/comjnl.oxfordjournals.org\/content\/early\/2013\/05\/12\/comjnl.bxt044.abstract . Accessed 12 May 2013","DOI":"10.1093\/comjnl\/bxt044"},{"issue":"1","key":"1511_CR21","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/S0097-8485(96)80004-0","volume":"20","author":"M Gribskov","year":"1996","unstructured":"Gribskov M, Robinson NL (1996) Use of receiver operating characteristic (ROC) analysis to evaluate sequence matching. Comput Chem 20(1):25\u201333","journal-title":"Comput Chem"},{"key":"1511_CR22","unstructured":"Hardwarezone (2013) Trend micro predicts android malware increase by 185%. http:\/\/www.hardwarezone.com.ph\/tech-news-trend-micro-predicts-android-malware-increase-185 . Accessed 1st Jan 2013"},{"key":"1511_CR23","doi-asserted-by":"crossref","unstructured":"Huang C-Y, Tsai Y-T, Hsu C-H (2013) Performance evaluation on permission-based detection for android malware. In: Pan, J-S, Yang C-N, Lin C-C (eds) Advances in intelligent systems and applications, vol 2. Springer, Berlin, pp 111\u2013120","DOI":"10.1007\/978-3-642-35473-1_12"},{"key":"1511_CR24","doi-asserted-by":"crossref","unstructured":"Hyo-Sik H, Mi-Jung C (2013) Analysis of android malware detection performance using machine learning classifiers. In: Proceedings of the international conference on ICT convergence (ICTC), Jeju, Ethiopia, pp 490\u2013495","DOI":"10.1109\/ICTC.2013.6675404"},{"key":"1511_CR25","first-page":"2721","volume":"7","author":"JZ Kolter","year":"2006","unstructured":"Kolter JZ, Maloof MA (2006) Learning to detect and classify malicious executables in the wild. J Mach Learn Res 7:2721\u20132744","journal-title":"J Mach Learn Res"},{"issue":"3","key":"1511_CR26","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/s10462-007-9052-3","volume":"26","author":"SB Kotsiantis","year":"2006","unstructured":"Kotsiantis SB, Zaharakis ID, Pintelas PE (2006) Machine learning: a review of classification and combining techniques. Artif Intell Rev 26(3):159\u2013190","journal-title":"Artif Intell Rev"},{"key":"1511_CR27","doi-asserted-by":"crossref","first-page":"3836","DOI":"10.1016\/j.proeng.2011.08.718","volume":"15","author":"Y Lai","year":"2011","unstructured":"Lai Y, Liu Z (2011) Unknown malicious code detection based on bayesian. Procedia Eng 15:3836\u20133842","journal-title":"Procedia Eng"},{"issue":"2","key":"1511_CR28","doi-asserted-by":"crossref","first-page":"122","DOI":"10.3109\/08820139.2012.736116","volume":"42","author":"MS Lamiaa Ibrahim","year":"2013","unstructured":"Lamiaa Ibrahim MS, Rahman Azema Abd El, Zeidan Amany, Ragb Maha (2013) Crucial role of CD4+CD 25+ FOXP3+ T regulatory cell, interferon- $$\\gamma $$ \u03b3 and interleukin-16 in malignant and tuberculous pleural effusions. Immunol Investig 42(2):122\u2013136","journal-title":"Immunol Investig"},{"issue":"4","key":"1511_CR29","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1145\/382912.382914","volume":"3","author":"W Lee","year":"2000","unstructured":"Lee W, Stolfo SJ (2000) A framework for constructing features and models for intrusion detection systems. ACM Trans Inf Syst Secur 3(4):227\u2013261","journal-title":"ACM Trans Inf Syst Secur"},{"key":"1511_CR30","doi-asserted-by":"crossref","unstructured":"Liang S, Keep AW, Might M, Lyde S, Gilray T, Aldous P, Horn DV (2013) Sound and precise malware analysis for android via pushdown reachability and entry-point saturation. In: Proceedings of the third ACM workshop on security and privacy in smartphones & mobile devices, Berlin, Germany, pp 21\u201332","DOI":"10.1145\/2516760.2516769"},{"issue":"5","key":"1511_CR31","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1016\/S0167-4048(02)00514-X","volume":"21","author":"Y Liao","year":"2002","unstructured":"Liao Y, Vemuri VR (2002) Use of k-nearest neighbor classifier for intrusion detection. Comput Secur 21(5):439\u2013448","journal-title":"Comput Secur"},{"key":"1511_CR32","unstructured":"Lookout (2010) Security alert: geinimi, sophisticated new android trojan found in wild. https:\/\/blog.lookout.com\/blog\/2010\/12\/29\/geinimi_trojan\/ . Accessed 1st July 2014"},{"key":"1511_CR33","doi-asserted-by":"crossref","unstructured":"Metz CE (1978) Basic principles of ROC analysis. Semin Nucl Med 8(4):283\u2013298","DOI":"10.1016\/S0001-2998(78)80014-2"},{"key":"1511_CR34","doi-asserted-by":"crossref","unstructured":"Oberheide J, Veeraraghavan K, Cooke E, Flinn J, Jahanian F (2008) Virtualized in-cloud security services for mobile devices. In: Proceedings of the 1st workshop on virtualization in mobile computing, Breckenridge, Colorado, pp 31\u201335","DOI":"10.1145\/1622103.1629656"},{"issue":"5","key":"1511_CR35","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1109\/72.159058","volume":"3","author":"SK Pal","year":"1992","unstructured":"Pal SK, Mitra S (1992) Multilayer perceptron, fuzzy sets, and classification. IEEE Trans Neural Netw 3(5):683\u2013697","journal-title":"IEEE Trans Neural Netw"},{"issue":"1","key":"1511_CR36","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.jnca.2012.08.007","volume":"36","author":"A Patel","year":"2013","unstructured":"Patel A, Taghavi M, Bakhtiyari K (2013) An intrusion detection and prevention system in cloud computing: a systematic review. J Netw Comput Appl 36(1):25\u201341","journal-title":"J Netw Comput Appl"},{"key":"1511_CR37","unstructured":"Play G (2013) Shop android apps. https:\/\/play.google.com\/store?hl=en . Accessed February 2013"},{"key":"1511_CR38","unstructured":"Project MG (2013) Android malware genome project. http:\/\/www.malgenomeproject.org\/ . Accessed Feb 2013"},{"key":"1511_CR39","doi-asserted-by":"crossref","unstructured":"Raffetseder T, Kruegel C, Kirda E (2007) Detecting system emulators. In: Proceedings of the 10th international conference ISC, Valpara\u00edso, Chile, pp 1\u201318","DOI":"10.1007\/978-3-540-75496-1_1"},{"key":"1511_CR40","unstructured":"SandDroid (2013) SandDroid-an APK analysis sandbox. http:\/\/sanddroid.xjtu.edu.cn\/ . Accessed April 2013"},{"issue":"18","key":"1511_CR41","doi-asserted-by":"crossref","first-page":"2227","DOI":"10.1016\/j.comcom.2011.07.001","volume":"34","author":"P Sangkatsanee","year":"2011","unstructured":"Sangkatsanee P, Wattanapongsakorn N, Charnsripinyo C (2011) Practical real-time intrusion detection using machine learning approaches. Comput Commun 34(18):2227\u20132235","journal-title":"Comput Commun"},{"issue":"6\u20137","key":"1511_CR42","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1080\/01969722.2013.803889","volume":"44","author":"B Sanz","year":"2013","unstructured":"Sanz B, Santos I, Laorden C, Ugarte-Pedrero X, Nieves J, Bringas PG (2013) MAMA: manifest analysis for malware detection in android. Cybern Syst 44(6\u20137):469\u2013488","journal-title":"Cybern Syst"},{"key":"1511_CR43","doi-asserted-by":"crossref","unstructured":"Sarma BP, Li N, Gates C, Potharaju R, Nita-Rotaru C and Molloy I (2012), \u201cAndroid permissions: a perspective combining risks and benefits. In: Proceedings of the 17th ACM symposium on access control models and technologies, Newark, New Jersey, USA, pp 13\u201322","DOI":"10.1145\/2295136.2295141"},{"key":"1511_CR44","unstructured":"Schneider J (1997) Cross validation. http:\/\/www.cs.cmu.edu\/~schneide\/tut5\/node42.html . Accessed July 2013"},{"key":"1511_CR45","unstructured":"Security P (2011) Rootkits: almost invisible malware. http:\/\/www.pandasecurity.com\/homeusers\/security-info\/types-malware\/rootkit\/ . Accessed July 2013"},{"key":"1511_CR46","doi-asserted-by":"crossref","unstructured":"Seo S-H, Gupta A, Mohamed Sallam A, Bertino E, Yim K (2013) Detecting mobile malware threats to homeland security through static analysis. J Netw Comput Appl doi: 10.1016\/j.jnca.2013.05.008 . Online. http:\/\/www.sciencedirect.com\/science\/article . Accessed Oct 2013","DOI":"10.1016\/j.jnca.2013.05.008"},{"issue":"1","key":"1511_CR47","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s10844-010-0148-x","volume":"38","author":"A Shabtai","year":"2012","unstructured":"Shabtai A, Kanonov U, Elovici Y, Glezer C, Weiss Y (2012) Andromaly: a behavioral malware detection framework for android devices. J Intell Inf Syst 38(1):161\u2013190","journal-title":"J Intell Inf Syst"},{"key":"1511_CR48","doi-asserted-by":"crossref","unstructured":"Shabtai A, Tenenboim-Chekina L, Mimran D, Rokach L, Shapira B, Elovici Y (2014) Mobile malware detection through analysis of deviations in application network behavior. Comput Secur 43:1\u201318","DOI":"10.1016\/j.cose.2014.02.009"},{"issue":"9","key":"1511_CR49","doi-asserted-by":"crossref","first-page":"2105","DOI":"10.1016\/j.engappai.2013.04.010","volume":"26","author":"S Shamshirband","year":"2013","unstructured":"Shamshirband S, Anuar NB, Kiah MLM, Patel A (2013) An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique. Eng Appl Artif Intell 26(9):2105\u20132127","journal-title":"Eng Appl Artif Intell"},{"key":"1511_CR50","doi-asserted-by":"crossref","unstructured":"Shamshirband S, Anuar NB, Kiah MLM, Rohani VA, Petkovi\u0107 D, Misra S, Khan AN (2014) Co-FAIS: cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks. J Netw Comput Appl 42:102\u2013117","DOI":"10.1016\/j.jnca.2014.03.012"},{"key":"1511_CR51","doi-asserted-by":"crossref","unstructured":"Shamshirband S, Patel A, Anuar NB, Kiah MLM, Abraham A (2014) Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks. Eng Appl Artif Intell 32:228\u2013241","DOI":"10.1016\/j.engappai.2014.02.001"},{"key":"1511_CR52","unstructured":"SlideME (2013) SlideME $$\\vert $$ | android apps market: download free & paid android application. http:\/\/slideme.org\/ . Accessed 1st Oct 2013"},{"key":"1511_CR53","doi-asserted-by":"crossref","unstructured":"Sohr K, Mustafa T, Nowak A (2011) Software security aspects of Java-based mobile phones. In: Proceedings of the 2011 ACM symposium on applied computing, Taichung, Taiwan, pp 1494\u20131501","DOI":"10.1145\/1982185.1982506"},{"key":"1511_CR54","doi-asserted-by":"crossref","unstructured":"Spackman KA (1989) Signal detection theory: valuable tools for evaluating inductive learning. In: Proceedings of the 6th international workshop on machine learning, Ithaca, New York, USA, pp 160\u2013163","DOI":"10.1016\/B978-1-55860-036-2.50047-3"},{"key":"1511_CR55","doi-asserted-by":"crossref","unstructured":"Su X, Chuah M, Tan G (2012) Smartphone dual defense protection framework: detecting malicious applications in android markets. In: Proceedings of the mobile ad-hoc and sensor networks (MSN), 2012 eighth international conference on, Chengdu, China, pp 153\u2013160","DOI":"10.1109\/MSN.2012.43"},{"key":"1511_CR56","unstructured":"Survey G (2013) Our mobile planet: global smartphone user. http:\/\/services.google.com\/fh\/files\/blogs\/final_global_smartphone_user_study_2012.pdf . Accessed June 2013"},{"key":"1511_CR57","unstructured":"Symantec (2013) Android ransomware predictions hold true. http:\/\/www.symantec.com\/connect\/blogs\/android-ransomware-predictions-hold-true . Accessed 1st Sept 2013"},{"key":"1511_CR58","doi-asserted-by":"crossref","unstructured":"Teufl P, Ferk M, Fitzek A, Hein D, Kraxberger S, Orthacker C (2013) Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play). In: Security and communication networks. doi: 10.1002\/sec.675 [Online]. http:\/\/dx.doi.org\/10.1002\/sec.675 . Accessed 1st April 2014","DOI":"10.1002\/sec.675"},{"key":"1511_CR59","doi-asserted-by":"crossref","unstructured":"Tin Kam H (1998) The random subspace method for constructing decision forests. IEEE Trans Pattern Anal Mach Intell 20(8):832\u2013844","DOI":"10.1109\/34.709601"},{"key":"1511_CR60","unstructured":"tPacketCapturePro (2013) tPacketCapture-Capture Communication Packets. http:\/\/www.taosoftware.co.jp\/en\/android\/packetcapture\/ . Accessed April 2013"},{"key":"1511_CR61","unstructured":"tshark (2013) tshark-the wireshark network analyzer. http:\/\/www.wireshark.org\/docs\/man-pages\/tshark.html . Accessed Feb 2013"},{"issue":"15","key":"1511_CR62","doi-asserted-by":"crossref","first-page":"1356","DOI":"10.1016\/S0140-3664(02)00037-3","volume":"25","author":"T Verwoerd","year":"2002","unstructured":"Verwoerd T, Hunt R (2002) Intrusion detection techniques and approaches. Comput Commun 25(15):1356\u20131365","journal-title":"Comput Commun"},{"key":"1511_CR63","unstructured":"Yajin Z, Xuxian J (2012) Dissecting android malware: characterization and evolution. In: Proceedings of the 2012 IEEE symposium on security and privacy (SP), San Fransico, USA, pp 95\u2013109"},{"key":"1511_CR64","doi-asserted-by":"crossref","unstructured":"Yerima SY, Sezer S, McWilliams G, Muttik I (2013) A new android malware detection approach using bayesian classification. In: Proceedings of the 2013 IEEE 27th international conference on advanced information networking and applications (AINA), Barcelona, Spain, pp 121\u2013128","DOI":"10.1109\/AINA.2013.88"},{"issue":"4","key":"1511_CR65","first-page":"715","volume":"7","author":"M Zhao","year":"2012","unstructured":"Zhao M, Zhang T, Ge F, Yuan Z (2012) RobotDroid: a lightweight malware detection framework on smartphones. J Netw 7(4):715\u2013722","journal-title":"J Netw"},{"key":"1511_CR66","unstructured":"Zheng M, Sun M, Lui J (2013) DroidAnalytics: a signature based analytic system to collect, extract, analyze and associate android malware. http:\/\/arxiv.org\/abs\/1302.7212 . Accessed 1st Oct 2013"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-014-1511-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-014-1511-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-014-1511-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,17]],"date-time":"2019-08-17T05:18:44Z","timestamp":1566019124000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-014-1511-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,9]]},"references-count":66,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,1]]}},"alternative-id":["1511"],"URL":"https:\/\/doi.org\/10.1007\/s00500-014-1511-6","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11,9]]}}}