{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T13:07:50Z","timestamp":1755695270145,"version":"3.37.3"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,9,30]],"date-time":"2017-09-30T00:00:00Z","timestamp":1506729600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"TELUS Corp"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s10115-017-1111-8","type":"journal-article","created":{"date-parts":[[2017,9,30]],"date-time":"2017-09-30T14:54:14Z","timestamp":1506783254000},"page":"771-796","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Mobile Apps identification based on network flows"],"prefix":"10.1007","volume":"55","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9263-1875","authenticated-orcid":false,"given":"Georgi","family":"Ajaeiya","sequence":"first","affiliation":[]},{"given":"Imad H.","family":"Elhajj","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Chehab","sequence":"additional","affiliation":[]},{"given":"Ayman","family":"Kayssi","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Kneppers","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,30]]},"reference":[{"unstructured":"Smartphone os market share 2015, 2014, 2013, and 2012. http:\/\/www.idc.com\/prodserv\/smartphone-os-market-share.jsp . Accessed 2016","key":"1111_CR1"},{"doi-asserted-by":"crossref","unstructured":"Baghel SK, Keshav K, Manepalli VR (2012). An investigation into traffic analysis for diverse data applications on smartphones. In: IEEE 2012 national conference on communications (NCC), pp\u00a01\u20135","key":"1111_CR2","DOI":"10.1109\/NCC.2012.6176903"},{"issue":"1\u20132","key":"1111_CR3","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1023\/A:1007515423169","volume":"36","author":"E Bauer","year":"1999","unstructured":"Bauer E, Kohavi R (1999) An empirical comparison of voting classification algorithms: bagging, boosting, and variants. Mach Learn 36(1\u20132):105\u2013139","journal-title":"Mach Learn"},{"unstructured":"Berndt DJ, Clifford J (1994) Using dynamic time warping to find patterns in time series. KDD workshop, vol 10. Seattle, WA, pp 359\u2013370","key":"1111_CR4"},{"issue":"2","key":"1111_CR5","first-page":"123","volume":"24","author":"L Breiman","year":"1996","unstructured":"Breiman L (1996) Bagging predictors. Mach Learn 24(2):123\u2013140","journal-title":"Mach Learn"},{"doi-asserted-by":"crossref","unstructured":"Burguera I, Zurutuza U, Nadjm-Tehrani S (2011). Crowdroid: behavior-based malware detection system for android. In Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices, pp 15\u201326. ACM. Chicago, IL, USA","key":"1111_CR6","DOI":"10.1145\/2046614.2046619"},{"key":"1111_CR7","first-page":"1","volume-title":"Using random forest to learn imbalanced data","author":"C Chen","year":"2004","unstructured":"Chen C, Liaw A, Breiman L (2004) Using random forest to learn imbalanced data. University of California, Berkeley, pp 1\u201312"},{"doi-asserted-by":"crossref","unstructured":"Choi Y, Chung JY, Park B, Hong JW-K (2012) Automated classifier generation for application-level mobile traffic identification. In: 2012 IEEE network operations and management symposium. IEEE. MAUI, HAWAII, USA, pp 1075\u20131081","key":"1111_CR8","DOI":"10.1109\/NOMS.2012.6212032"},{"issue":"1","key":"1111_CR9","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1109\/TIFS.2015.2478741","volume":"11","author":"M Conti","year":"2016","unstructured":"Conti M, Mancini LV, Spolaor R, Verde NV (2016) Analyzing android encrypted network traffic to identify user actions. IEEE Trans Inf Forensics Secur 11(1):114\u2013125","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"1111_CR10","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273\u2013297","journal-title":"Mach Learn"},{"doi-asserted-by":"crossref","unstructured":"Dai S, Tongaonkar A, Wang X, Nucci A, Song D (2013) Networkprofiler: towards automatic fingerprinting of android apps. In: INFOCOM, 2013 Proceedings IEEE. IEEE. Turin, Italy, pp 809\u2013817","key":"1111_CR11","DOI":"10.1109\/INFCOM.2013.6566868"},{"key":"1111_CR12","doi-asserted-by":"crossref","DOI":"10.1201\/9780429246593","volume-title":"An introduction to the bootstrap","author":"B Efron","year":"1994","unstructured":"Efron B, Tibshirani RJ (1994) An introduction to the bootstrap. CRC Press, Boca Raton"},{"doi-asserted-by":"crossref","unstructured":"Falaki H, Lymberopoulos D, Mahajan R, Kandula S, Estrin D (2010). A first look at traffic on smartphones. In: Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, pp 281\u2013287. ACM. Melbourne, Australia","key":"1111_CR13","DOI":"10.1145\/1879141.1879176"},{"doi-asserted-by":"crossref","unstructured":"Johnson R, Wang Z, Gagnon C, Stavrou A (2012) Analysis of android applications\u2019 permissions. In: 2012 IEEE sixth international conference on software security and reliability companion (SERE-C). IEEE. Gaithersburg, MD, USA, pp 45\u201346","key":"1111_CR14","DOI":"10.1109\/SERE-C.2012.44"},{"unstructured":"Kotsiantis SB (2007) Supervised machine learning: a review of classification techniques In: Proceedings of the 2007 conference on emerging artificial intelligence applications in computer engineering: real word AI systems with applications in eHealth, HCI, information retrieval and pervasive technologie. IOS Press, Netherlands, pp 3\u201324. http:\/\/dl.acm.org\/citation.cfm?id=1566770.1566773","key":"1111_CR15"},{"doi-asserted-by":"crossref","unstructured":"Kuncheva LI (2004). Classifier ensembles for changing environments. In: International workshop on multiple classifier systems, Springer, pp 1\u201315","key":"1111_CR16","DOI":"10.1007\/978-3-540-25966-4_1"},{"doi-asserted-by":"crossref","unstructured":"Li J, Zhai L, Zhang X, Quan D (2014) Research of android malware detection based on network traffic monitoring. In: 2014 9th IEEE conference on industrial electronics and applications. IEEE. Hangzhou, China, pp 1739\u20131744","key":"1111_CR17","DOI":"10.1109\/ICIEA.2014.6931449"},{"issue":"5","key":"1111_CR18","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1109\/MITP.2012.93","volume":"14","author":"KW Miller","year":"2012","unstructured":"Miller KW, Voas JM, Hurlburt GF (2012) Byod: security and privacy considerations. It Prof 14(5):53\u201355","journal-title":"It Prof"},{"issue":"2","key":"1111_CR19","first-page":"247","volume":"24","author":"S Mongkolluksamee","year":"2016","unstructured":"Mongkolluksamee S, Visoottiviseth V, Fukuda K (2016) Combining communication patterns and traffic patterns to enhance mobile traffic identification performance. J Inf Process 24(2):247\u2013254","journal-title":"J Inf Process"},{"unstructured":"Moore AW (2001) Information gain. School of Computer Science, Carnegie Mellon University. http:\/\/www.cs.cmu.edu\/~awm\/tutorials","key":"1111_CR20"},{"issue":"2","key":"1111_CR21","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1023\/B:APIN.0000033632.42843.17","volume":"21","author":"YL Murphey","year":"2004","unstructured":"Murphey YL, Guo H, Feldkamp LA (2004) Neural learning from unbalanced data. Appl Intell 21(2):117\u2013128","journal-title":"Appl Intell"},{"issue":"3","key":"1111_CR22","doi-asserted-by":"crossref","first-page":"795","DOI":"10.1007\/s10115-016-0918-z","volume":"49","author":"N Nissim","year":"2016","unstructured":"Nissim N, Moskovitch R, BarAd O, Rokach L, Elovici Y (2016) Aldroid: efficient update of android anti-virus software using designated active learning methods. Knowl Inf Syst 49(3):795\u2013833","journal-title":"Knowl Inf Syst"},{"issue":"1","key":"1111_CR23","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/s10115-015-0903-y","volume":"49","author":"C Opri\u015fa","year":"2016","unstructured":"Opri\u015fa C, Gavrilu\u0163 D, Cab\u0103u G (2016) A scalable approach for detecting plagiarized mobile applications. Knowl Inf Syst 49(1):143\u2013169","journal-title":"Knowl Inf Syst"},{"unstructured":"Osuna E, Freund R, Girosi F (1997) Support vector machines: training and applications. Massachusetts Institute of Technology, USA. http:\/\/www.ncstrl.org:8900\/ncstrl\/servlet\/search?formname=detail&id=oai%3Ancstrlh%3Amitai%3AMIT-AILab%2F%2FAIM-1602","key":"1111_CR24"},{"doi-asserted-by":"crossref","unstructured":"Pieterse H, Olivier MS (2012) Android botnets on the rise: trends and characteristics. In: IEEE 2012 Information security for South Africa, pp 1\u20135","key":"1111_CR25","DOI":"10.1109\/ISSA.2012.6320432"},{"doi-asserted-by":"crossref","unstructured":"Qi Y, Cao M, Zhang C, Wu R (2014) A design of network behavior-based malware detection system for android. IN: International conference on algorithms and architectures for parallel processing. Springer. Dalian, China, pp 590\u2013600","key":"1111_CR26","DOI":"10.1007\/978-3-319-11194-0_52"},{"issue":"1","key":"1111_CR27","first-page":"81","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan JR (1986) Induction of decision trees. Mach Learn 1(1):81\u2013106","journal-title":"Mach Learn"},{"key":"1111_CR28","first-page":"725","volume":"1","author":"JR Quinlan","year":"1996","unstructured":"Quinlan JR (1996) Bagging, boosting, and c4. 5. AAAI\/IAAI 1:725\u2013730","journal-title":"AAAI\/IAAI"},{"unstructured":"Rish I (2001) An empirical study of the naive bayes classifier. In: IJCAI 2001 workshop on empirical methods in artificial intelligence, vol 3. IBM New York. Seattle, Washington, USA, pp 41\u201346","key":"1111_CR29"},{"doi-asserted-by":"crossref","unstructured":"Saab F, Elhajj I, Kayssi A, Chehab A (2016). A crowdsourcing game-theoretic intrusion detection and rating system. In Proceedings of the 31st annual ACM symposium on applied computing, pp 622\u2013625. ACM","key":"1111_CR30","DOI":"10.1145\/2851613.2851933"},{"issue":"6\u20137","key":"1111_CR31","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1080\/01969722.2013.803889","volume":"44","author":"B Sanz","year":"2013","unstructured":"Sanz B, Santos I, Laorden C, Ugarte-Pedrero X, Nieves J, Bringas PG, \u00c1lvarez Mara\u00f1\u00f3n G (2013) Mama: manifest analysis for malware detection in android. Cybern Syst 44(6\u20137):469\u2013488","journal-title":"Cybern Syst"},{"issue":"1","key":"1111_CR32","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s10844-010-0148-x","volume":"38","author":"A Shabtai","year":"2012","unstructured":"Shabtai A, Kanonov U, Elovici Y, Glezer C, Weiss Y (2012) andromaly: a behavioral malware detection framework for android devices. J Intell Inf Syst 38(1):161\u2013190","journal-title":"J Intell Inf Syst"},{"key":"1111_CR33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cose.2014.02.009","volume":"43","author":"A Shabtai","year":"2014","unstructured":"Shabtai A, Tenenboim-Chekina L, Mimran D, Rokach L, Shapira B, Elovici Y (2014) Mobile malware detection through analysis of deviations in application network behavior. Comput Secur 43:1\u201318","journal-title":"Comput Secur"},{"doi-asserted-by":"crossref","unstructured":"Taylor VF, Spolaor R, Conti M, Martinovic I (2016) Appscanner: automatic fingerprinting of smartphone apps from encrypted network traffic. In: 2016 IEEE European symposium on security and privacy (EuroS&P). IEEE. Saarbrcken, GERMANY, pp 439\u2013454","key":"1111_CR34","DOI":"10.1109\/EuroSP.2016.40"},{"doi-asserted-by":"crossref","unstructured":"Tsompanidis I, Zahran AH, Sreenan CJ (2014) Mobile network traffic: a user behaviour model. In: 2014 7th IFIP wireless and mobile networking conference (WMNC). IEEE. Vilamoura, Algarve, Portugal, pp 1\u20138","key":"1111_CR35","DOI":"10.1109\/WMNC.2014.6878862"},{"issue":"2","key":"1111_CR36","doi-asserted-by":"crossref","first-page":"294","DOI":"10.24297\/ijct.v3i2b.6773","volume":"3","author":"S Upadhyaya","year":"2012","unstructured":"Upadhyaya S, Singh K (2012) Classification based outlier detection techniques. Int J Comput Trends Technol 3(2):294\u2013298","journal-title":"Int J Comput Trends Technol"},{"doi-asserted-by":"crossref","unstructured":"Wei X, Gomez L, Neamtiu I, Faloutsos M (2012). Profiledroid: multi-layer profiling of android applications. In: Proceedings of the 18th annual international conference on Mobile computing and networking, pp 137\u2013148. ACM. Istanbul, Turkey","key":"1111_CR37","DOI":"10.1145\/2348543.2348563"},{"doi-asserted-by":"crossref","unstructured":"Zaman M, Siddiqui T, Amin MR, Hossain MS (2015) Malware detection in android by network traffic analysis. In: 2015 International conference on networking systems and security (NSysS). IEEE. Dhaka, Bangladesh, pp 1\u20135","key":"1111_CR38","DOI":"10.1109\/NSysS.2015.7043530"},{"issue":"5","key":"1111_CR39","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1109\/TSMCC.2008.923876","volume":"38","author":"J Zhang","year":"2008","unstructured":"Zhang J, Zulkernine M, Haque A (2008) Random-forests-based network intrusion detection systems. IEEE Trans Syst Man Cybern C Appl Rev 38(5):649\u2013659","journal-title":"IEEE Trans Syst Man Cybern C Appl Rev"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10115-017-1111-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-017-1111-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-017-1111-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,18]],"date-time":"2020-10-18T14:55:24Z","timestamp":1603032924000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10115-017-1111-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,30]]},"references-count":39,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["1111"],"URL":"https:\/\/doi.org\/10.1007\/s10115-017-1111-8","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"type":"print","value":"0219-1377"},{"type":"electronic","value":"0219-3116"}],"subject":[],"published":{"date-parts":[[2017,9,30]]}}}