{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T23:40:20Z","timestamp":1768779620418,"version":"3.49.0"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T00:00:00Z","timestamp":1497657600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100012457","name":"Chongqing Basic and Frontier Research Project","doi-asserted-by":"crossref","award":["cstc2016jcyjA0590"],"award-info":[{"award-number":["cstc2016jcyjA0590"]}],"id":[{"id":"10.13039\/501100012457","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"crossref","award":["61672004"],"award-info":[{"award-number":["61672004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s10586-017-0981-6","type":"journal-article","created":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T05:21:57Z","timestamp":1497676917000},"page":"955-966","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["Android malware detection method based on naive Bayes and permission correlation algorithm"],"prefix":"10.1007","volume":"21","author":[{"given":"Fengjun","family":"Shang","sequence":"first","affiliation":[]},{"given":"Yalin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaolin","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Dexiang","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,17]]},"reference":[{"key":"981_CR1","doi-asserted-by":"crossref","unstructured":"Shabtai, A., Elovici, Y.: Applying behavioral Ddetection on Android-based devices. In: Mobile Wireless Middleware, Operating Systems, and Applications. Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp. 235\u2013249. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-17758-3_17"},{"key":"981_CR2","unstructured":"Appbrain: Number of Android applications. http:\/\/www.appbrain.com\/stats\/num-ber-of-android-apps (2013)"},{"issue":"8","key":"981_CR3","first-page":"79","volume":"35","author":"WP Wen","year":"2014","unstructured":"Wen, W.P., Mei, R., Ning, G., et al.: Malware detection technology analysis and applied research of android platform. J. Commun. 35(8), 79\u201394 (2014)","journal-title":"J. Commun."},{"issue":"10","key":"981_CR4","first-page":"2167","volume":"52","author":"Yuqing Zhang","year":"2015","unstructured":"Zhang, Yuqing, Fang, Zhejun, Wang, Kai, et al.: Survey of Android vulnerability detection. J. Compu. Res. Dev. 52(10), 2167\u20132177 (2015)","journal-title":"J. Compu. Res. Dev."},{"issue":"7","key":"981_CR5","first-page":"1458","volume":"51","author":"Ting Li","year":"2014","unstructured":"Li, Ting, Dong, Hang, Wang, Chunyang, et al.: Description of Android malware feature based on Dalvik instructions. J. Compu. Res. Dev. 51(7), 1458\u20131466 (2014)","journal-title":"J. Compu. Res. Dev."},{"issue":"7","key":"981_CR6","first-page":"1446","volume":"51","author":"Sibei Jiao","year":"2014","unstructured":"Jiao, Sibei, Ying, Lingyun, Yang, Zhi, et al.: An anti-obfuscation method for detecting similarity among Android applications in large scale. J. Compu. Res. Dev. 51(7), 1446\u20131457 (2014)","journal-title":"J. Compu. Res. Dev."},{"key":"981_CR7","doi-asserted-by":"crossref","unstructured":"Cen, L., Gates, C.S., Si, L.: A probabilistic discriminative model for Android malware detection with decomplied source code. In: Proceedings of IEEE Transaction on Dependable and Secure Computing, pp. 400\u2013412. (2015)","DOI":"10.1109\/TDSC.2014.2355839"},{"key":"981_CR8","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1109\/TST.2016.7399288","volume":"21","author":"Z Yuan","year":"2016","unstructured":"Yuan, Z., Lu, Y., Xue, Y.: DroidDetector: Android malware characterization and detection using deep learning. Tsinghua Sci. Technol. 21, 114\u2013123 (2016)","journal-title":"Tsinghua Sci. Technol."},{"key":"981_CR9","doi-asserted-by":"crossref","unstructured":"Liang, S., Du, X.: Permission-combination-based scheme for Android mobile malware detection. In: IEEE ICC 2014-Mobile and Wireless and Wireless Networking Symposium, pp. 2301\u20132306. IEEE (2014)","DOI":"10.1109\/ICC.2014.6883666"},{"key":"981_CR10","doi-asserted-by":"crossref","unstructured":"Xiangyu, JU.: Android malware detection though permission and package. In: Proceedings of the 2014 International Conference on Wavelet Analysis and Pattern Recognition, pp. 61\u201365. Lanzhou (2014)","DOI":"10.1109\/ICWAPR.2014.6961291"},{"issue":"2","key":"981_CR11","first-page":"263","volume":"26","author":"Yang Luo","year":"2015","unstructured":"Luo, Yang, Zhang, Qixun, et al.: Android multi-level system permission management approach. J. Softw. 26(2), 263\u2013271 (2015)","journal-title":"J. Softw."},{"issue":"1","key":"981_CR12","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1360\/N112013-00130","volume":"44","author":"HY Wang","year":"2014","unstructured":"Wang, H.Y., Wang, Z.Y., Guo, Y., et al.: Detecting repackaged Android applications based on code clone detection technique. SCI. SIN. Inf. 44(1), 142\u2013157 (2014). (in Chinese with English abstract)","journal-title":"SCI. SIN. Inf."},{"key":"981_CR13","doi-asserted-by":"crossref","unstructured":"Sarwar, G., Mehani, O., Boreli, R., et al.: On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices. In: Proceedings of the 10th International Conference on Security and Cryptography, pp. 461\u2013468. Springer-Verlag, Heidelberg (2013)","DOI":"10.5220\/0004535104610468"},{"key":"981_CR14","doi-asserted-by":"publisher","unstructured":"Xu, Y., Wu, C., Hou, M., et al.: Android malware detection technology based on improved na\u00efve Bayesian. J. Beijing Univ. Posts Telecommun. (2016). doi: 10.13190\/j.jbupt.2016.02.009","DOI":"10.13190\/j.jbupt.2016.02.009"},{"key":"981_CR15","doi-asserted-by":"crossref","unstructured":"Liu, X., Liu, J.: A two-layered permission-based Android malware detection scheme. In: Proceedings of 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), pp. 142\u2013148. IEEE (2014)","DOI":"10.1109\/MobileCloud.2014.22"},{"key":"981_CR16","doi-asserted-by":"crossref","unstructured":"Glodek, W., Harang. R.: Rapid permissions-based detection and analysis of mobile malware using random decision forests. In: Proceedings of Military Communications Conference, MILCOM 2013\u20132013, pp. 980\u2013985. IEEE (2013)","DOI":"10.1109\/MILCOM.2013.170"},{"issue":"5","key":"981_CR17","doi-asserted-by":"crossref","first-page":"1541","DOI":"10.1109\/TCOMM.2015.2422293","volume":"63","author":"Florence Alberge","year":"2015","unstructured":"Alberge, Florence: On some properties of the mutual information between extrinsics with application to iterative decoding. IEEE Trans. Commun. 63(5), 1541\u20131553 (2015)","journal-title":"IEEE Trans. Commun."},{"key":"981_CR18","doi-asserted-by":"crossref","unstructured":"Chan, P.P., Song, W.: Static detection of Android malware by using permission and API calls[. In: Proceedings of the 2014 International Conference, pp. 82\u201387. IEEE (2014)","DOI":"10.1109\/ICMLC.2014.7009096"},{"key":"981_CR19","doi-asserted-by":"crossref","unstructured":"Liang, S., Du, X.: Permission-combination-based scheme for Android mobile malware detection. In: Proceedings of the IEEE ICC 2014\u2013Mobile and Wireless Networking Symposium, pp. 2301\u20132306. IEEE (2014)","DOI":"10.1109\/ICC.2014.6883666"},{"issue":"Z1","key":"981_CR20","first-page":"106","volume":"34","author":"Huan Yang","year":"2013","unstructured":"Yang, Huan, Zhang, Yuqing, Yupu, Hu, et al.: Android malware detection method based on permission sequential pattern mining algorithm. J. Commun. 34(Z1), 106\u2013115 (2013)","journal-title":"J. Commun."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-0981-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0981-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0981-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T18:41:16Z","timestamp":1750358476000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-0981-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,17]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["981"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-0981-6","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6,17]]}}}