{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T23:52:18Z","timestamp":1775260338744,"version":"3.50.1"},"reference-count":79,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,10,31]],"date-time":"2018-10-31T00:00:00Z","timestamp":1540944000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s40860-018-0072-3","type":"journal-article","created":{"date-parts":[[2018,10,30]],"date-time":"2018-10-30T22:43:58Z","timestamp":1540939438000},"page":"225-245","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Experimenting and assessing machine learning tools for detecting and analyzing malicious behaviors in complex environments"],"prefix":"10.1007","volume":"4","author":[{"given":"Alfredo","family":"Cuzzocrea","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Mercaldo","sequence":"additional","affiliation":[]},{"given":"Giorgio Mario","family":"Grasso","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,31]]},"reference":[{"key":"72_CR1","unstructured":"Dissecting the android bouncer. https:\/\/jon.oberheide.org\/files\/summercon12-bouncer.pdf . Accessed 30 Jan 2015"},{"key":"72_CR2","volume-title":"The illustrated wavelet transform handbook: introductory theory and applications in science, engineering, medicine and finance","author":"PS Addision","year":"2002","unstructured":"Addision PS (2002) The illustrated wavelet transform handbook: introductory theory and applications in science, engineering, medicine and finance. Taylor & Francis Group, Abingdon"},{"key":"72_CR3","doi-asserted-by":"crossref","unstructured":"Al-Kahtani MS (2012) Survey on security attacks in vehicular ad hoc networks (vanets). In: 6th international conference on signal processing and communication systems (ICSPCS), 2012, pp\u00a01\u20139.,IEEE","DOI":"10.1109\/ICSPCS.2012.6507953"},{"key":"72_CR4","doi-asserted-by":"crossref","unstructured":"Al-rimy BAS, Maarof MA, Shaid SZM. (2018) Ransomware threat success factors, taxonomy, and countermeasures: a survey and research directions. Comput Secur","DOI":"10.1016\/j.cose.2018.01.001"},{"key":"72_CR5","doi-asserted-by":"crossref","unstructured":"Andronio N, Zanero S, Maggi F (2015) Heldroid: dissecting and detecting mobile ransomware. In: International workshop on recent advances in intrusion detection, pp\u00a0382\u2013404. Springer","DOI":"10.1007\/978-3-319-26362-5_18"},{"key":"72_CR6","unstructured":"Athanasiadis IN, Kaburlasos VG, Mitkas PA, Petridis V (2003) Applying machine learning techniques on air quality data for real-time decision support. In: ITEE. Citeseer"},{"key":"72_CR7","doi-asserted-by":"crossref","unstructured":"Baccouche M, Mamalet F, Wolf C, Garcia C, Baskurt A (2011) Sequential deep learning for human action recognition. In: International workshop on human behavior understanding, pp\u00a029\u201339. Springer","DOI":"10.1007\/978-3-642-25446-8_4"},{"key":"72_CR8","doi-asserted-by":"crossref","unstructured":"Barker J, Hannay P, Szewczyk P (2011) Using traffic analysis to identify the second generation onion router. In: IFIP 9th international Conference on embedded and ubiquitous computing (EUC), 2011, pp\u00a072\u201378. IEEE","DOI":"10.1109\/EUC.2011.76"},{"key":"72_CR9","doi-asserted-by":"crossref","unstructured":"Battista P, Mercaldo F, Nardone V, Santone A, Visaggio CA (2016) Identification of android malware families with model checking. In: Proceedings of the 2nd international conference on information systems security and privacy, ICISSP 2016, Rome, Italy, February 19\u201321, 2016, pp\u00a0542\u2013547. SciTePress","DOI":"10.5220\/0005809205420547"},{"issue":"4","key":"72_CR10","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/s11416-013-0185-4","volume":"9","author":"D Baysa","year":"2013","unstructured":"Baysa D, Low RM, Stamp M (2013) Structural entropy and metamorphic malware. J Comput Virol Hacking Tech 9(4):179\u2013192","journal-title":"J Comput Virol Hacking Tech"},{"key":"72_CR11","doi-asserted-by":"crossref","unstructured":"Bernardi ML, Cimitile M, Martinelli F, Mercaldo F (2018) Driver and path detection through time-series classification. J Adv Transp","DOI":"10.1155\/2018\/1758731"},{"key":"72_CR12","doi-asserted-by":"crossref","unstructured":"Borda M (2011) Fundamentals in information theory and coding. Springer","DOI":"10.1007\/978-3-642-20347-3"},{"key":"72_CR13","unstructured":"Bouckaert RR. (2004) Bayesian network classifiers in weka"},{"key":"72_CR14","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/j.procs.2014.08.114","volume":"35","author":"P Braun","year":"2014","unstructured":"Braun P, Cameron J, Cuzzocrea A, Jiang F, Leung C (2014) Effectively and efficiently mining frequent patterns from dense graph streams on disk. Proc Comput Sci 35:338\u2013347","journal-title":"Proc Comput Sci"},{"key":"72_CR15","doi-asserted-by":"crossref","unstructured":"Canfora G, Mercaldo F, Visaggio CA (2013) A classifier of malicious android applications. In: Eighth international conference on availability, reliability and security (ARES), 2013, pp\u00a0607\u2013614. IEEE","DOI":"10.1109\/ARES.2013.80"},{"key":"72_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2016.04.009","volume":"61","author":"G Canfora","year":"2016","unstructured":"Canfora G, Mercaldo F, Visaggio CA (2016) An hmm and structural entropy based detector for android malware: an empirical study. Comput Secur 61:1\u201318","journal-title":"Comput Secur"},{"issue":"3","key":"72_CR17","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1080\/19393555.2014.931487","volume":"23","author":"G Canfora","year":"2014","unstructured":"Canfora G, Mercaldo F, Visaggio CA, Di Notte P (2014) Metamorphic malware detection using code metrics. Inform Secur J Glob Perspect 23(3):57\u201367","journal-title":"Inform Secur J Glob Perspect"},{"key":"72_CR18","unstructured":"Cannataro M, Cuzzocrea A, Mastroianni C, Ortale R, Pugliese A (2002) Modeling adaptive hypermedia with an object-oriented approach and xml. In: Second international workshop on web dynamics"},{"key":"72_CR19","unstructured":"Cannataro M, Cuzzocrea A, Pugliese A (2001) A probabilistic approach to model adaptive hypermedia systems. In: Proceedings of the international workshop for web dynamics, pp\u00a012\u201330"},{"key":"72_CR20","doi-asserted-by":"crossref","unstructured":"Chaabane A, Manils P, Kaafar MA (2010) Digging into anonymous traffic: a deep analysis of the tor anonymizing network. In: 4th International conference on network and system security (NSS), 2010, pp\u00a0167\u2013174. IEEE","DOI":"10.1109\/NSS.2010.47"},{"key":"72_CR21","doi-asserted-by":"crossref","unstructured":"Chakravarty S, Barbera MV, Portokalidis G, Polychronakis M, Keromytis AD (2014) On the effectiveness of traffic analysis against anonymity networks using flow records. In: PAM, pp\u00a0247\u2013257. Springer","DOI":"10.1007\/978-3-319-04918-2_24"},{"key":"72_CR22","doi-asserted-by":"crossref","unstructured":"Cimitile A, Martinelli F, Mercaldo F (2017) Machine learning meets ios malware: identifying malicious applications on apple environment. In: Proceedings of the 3rd international conference on information systems security and privacy, pp\u00a0487\u2013492","DOI":"10.5220\/0006217304870492"},{"key":"72_CR23","doi-asserted-by":"crossref","unstructured":"Cimitile A, Mercaldo F, Nardone V, Santone A, Visaggio CA (2017) Talos: no more ransomware victims with formal methods. Int J Inform Secur","DOI":"10.1007\/s10207-017-0398-5"},{"key":"72_CR24","doi-asserted-by":"crossref","unstructured":"Cuzzocrea A (2006) Accuracy control in compressed multidimensional data cubes for quality of answer-based OLAP tools. In: 18th International conference on scientific and statistical database management, SSDBM 2006, 3\u20135 July 2006, Vienna, Austria, Proceedings, pp\u00a0301\u2013310","DOI":"10.1109\/SSDBM.2006.10"},{"issue":"3","key":"72_CR25","first-page":"289","volume":"4","author":"A Cuzzocrea","year":"2006","unstructured":"Cuzzocrea A (2006) Combining multidimensional user models and knowledge representation and management techniques for making web services knowledge-aware. Web Intell Agent Syst 4(3):289\u2013312","journal-title":"Web Intell Agent Syst"},{"issue":"2","key":"72_CR26","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.datak.2005.03.011","volume":"56","author":"A Cuzzocrea","year":"2006","unstructured":"Cuzzocrea A (2006) Improving range-sum query evaluation on data cubes via polynomial approximation. Data Knowl Eng 56(2):85\u2013121","journal-title":"Data Knowl Eng"},{"key":"72_CR27","doi-asserted-by":"crossref","unstructured":"Cuzzocrea A, Fortino G, Rana OF (2013) Managing data and processes in cloud-enabled large-scale sensor networks: state-of-the-art and future research directions. In: 13th IEEE\/ACM international symposium on cluster, cloud, and grid computing, CCGrid 2013, Delft, Netherlands, May 13\u201316, 2013, pp\u00a0583\u2013588","DOI":"10.1109\/CCGrid.2013.116"},{"key":"72_CR28","doi-asserted-by":"crossref","unstructured":"Cuzzocrea A, Furfaro F, Greco S, Masciari E, Mazzeo GM, Sacc\u00e0 D (2005) A distributed system for answering range queries on sensor network data. In: 3rd IEEE conference on pervasive computing and communications workshops (PerCom 2005 Workshops), 8\u201312 March 2005, Kauai Island, HI, USA, pp\u00a0369\u2013373","DOI":"10.1109\/PERCOMW.2005.5"},{"issue":"2","key":"72_CR29","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s10844-008-0065-4","volume":"33","author":"A Cuzzocrea","year":"2009","unstructured":"Cuzzocrea A, Furfaro F, Sacc\u00e0 D (2009) Enabling OLAP in mobile environments via intelligent data cube compression techniques. J Intell Inf Syst 33(2):95\u2013143","journal-title":"J Intell Inf Syst"},{"issue":"3","key":"72_CR30","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/2560563","volume":"23","author":"N Francesco De","year":"2014","unstructured":"De Francesco N, Lettieri G, Santone A, Vaglini G (2014) Grease: a tool for efficient nonequivalence checking. ACM Trans Softw Eng Methodol 23(3):24","journal-title":"ACM Trans Softw Eng Methodol"},{"issue":"2","key":"72_CR31","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/s10270-014-0416-2","volume":"15","author":"N Francesco De","year":"2016","unstructured":"De Francesco N, Lettieri G, Santone A, Vaglini G (2016) Heuristic search for equivalence checking. Softw Syst Model 15(2):513\u2013530","journal-title":"Softw Syst Model"},{"key":"72_CR32","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.autcon.2017.11.002","volume":"86","author":"L Ding","year":"2018","unstructured":"Ding L, Fang W, Luo H, Love PE, Zhong B, Ouyang X (2018) A deep hybrid learning model to detect unsafe behavior: integrating convolution neural networks and long short-term memory. Autom Constr 86:118\u2013124","journal-title":"Autom Constr"},{"key":"72_CR33","doi-asserted-by":"crossref","unstructured":"Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. Tech. rep, DTIC Document","DOI":"10.21236\/ADA465464"},{"key":"72_CR34","doi-asserted-by":"crossref","unstructured":"Draper-Gil G, Lashkari AH, Mamun MSI, Ghorbani AA (2016) Characterization of encrypted and vpn traffic using time-related","DOI":"10.5220\/0005740704070414"},{"key":"72_CR35","doi-asserted-by":"crossref","unstructured":"Ferrante A, Malek M, Martinelli F, Mercaldo F, Milosevic J (2017) Extinguishing ransomware-a hybrid approach to android ransomware detection. In: The 10th international symposium on foundations practice of security","DOI":"10.1007\/978-3-319-75650-9_16"},{"issue":"2\u20133","key":"72_CR36","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1023\/A:1007465528199","volume":"29","author":"N Friedman","year":"1997","unstructured":"Friedman N, Geiger D, Goldszmidt M (1997) Bayesian network classifiers. Mach Learn 29(2\u20133):131\u2013163","journal-title":"Mach Learn"},{"key":"72_CR37","unstructured":"Gharib A, Ghorbani A (2017) Dna-droid: a real-time android ransomware detection framework. In: Yan Z, Molva R, Mazurczyk W, Kantola R (eds) Network and system security: 11th International conference, NSS 2017, Helsinki, Finland, August 21\u201323, 2017, Proceedings"},{"key":"72_CR38","doi-asserted-by":"crossref","unstructured":"Goldszmidt M (2010) Bayesian network classifiers. Wiley encyclopedia of operations research and management science","DOI":"10.1002\/9780470400531.eorms0099"},{"key":"72_CR39","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.entcs.2004.06.010","volume":"110","author":"S Gradara","year":"2004","unstructured":"Gradara S, Santone A, Villani M, Vaglini G (2004) Model checking multithreaded programs by means of reduced models. Electr Notes Theor Comput Sci 110:55\u201374","journal-title":"Electr Notes Theor Comput Sci"},{"key":"72_CR40","doi-asserted-by":"crossref","unstructured":"He G, Yang M, Luo J, Gu X (2014) Inferring application type information from tor encrypted traffic. In: Second international Conference on advanced cloud and big data (CBD), 2014, pp\u00a0220\u2013227. IEEE","DOI":"10.1109\/CBD.2014.37"},{"issue":"1","key":"72_CR41","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1023\/A:1022631118932","volume":"11","author":"RC Holte","year":"1993","unstructured":"Holte RC (1993) Very simple classification rules perform well on most commonly used datasets. Mach Learn 11(1):63\u201390","journal-title":"Mach Learn"},{"issue":"3","key":"72_CR42","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s10618-009-0131-8","volume":"19","author":"J H\u00fchn","year":"2009","unstructured":"H\u00fchn J, H\u00fcllermeier E (2009) Furia: an algorithm for unordered fuzzy rule induction. Data Min Knowl Discov 19(3):293\u2013319","journal-title":"Data Min Knowl Discov"},{"key":"72_CR43","doi-asserted-by":"crossref","unstructured":"Ilisei I, Inkpen D, Pastor GC, Mitkov, R (2010) Identification of translationese: a machine learning approach. In: CICLing, vol 6008, pp\u00a0503\u2013511. Springer","DOI":"10.1007\/978-3-642-12116-6_43"},{"issue":"1","key":"72_CR44","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/S0165-0114(03)00114-3","volume":"141","author":"H Ishibuchi","year":"2004","unstructured":"Ishibuchi H, Yamamoto T (2004) Fuzzy rule selection by multi-objective genetic local search algorithms and rule evaluation measures in data mining. Fuzzy Sets Syst 141(1):59\u201388","journal-title":"Fuzzy Sets Syst"},{"issue":"2","key":"72_CR45","doi-asserted-by":"publisher","first-page":"498","DOI":"10.21917\/ijsc.2013.0075","volume":"3","author":"S Jayanthi","year":"2013","unstructured":"Jayanthi S, Sasikala S (2013) Reptree classifier for identifying link spam in web search engines. IJSC 3(2):498\u2013505","journal-title":"IJSC"},{"key":"72_CR46","doi-asserted-by":"crossref","unstructured":"Jensen R, Cornelis C (2008) A new approach to fuzzy-rough nearest neighbour classification. In: International conference on rough sets and current trends in computing, pp\u00a0310\u2013319. Springer","DOI":"10.1007\/978-3-540-88425-5_32"},{"key":"72_CR47","doi-asserted-by":"crossref","unstructured":"Jensen R, Cornelis C (2011) Fuzzy-rough nearest neighbour classification. In: Transactions on rough sets XIII, pp\u00a056\u201372. Springer","DOI":"10.1007\/978-3-642-18302-7_4"},{"key":"72_CR48","doi-asserted-by":"crossref","unstructured":"Kwak BI, Woo J, Kim HK (2016) Know your master: driver profiling-based anti-theft method. In: PST 2016","DOI":"10.1109\/PST.2016.7906929"},{"key":"72_CR49","doi-asserted-by":"crossref","unstructured":"Lashkari AH, Gil GD, Mamun MSI, Ghorbani AA (2017) Characterization of tor traffic using time based features. In: Proceedings of the 3rd international conference on information systems security and privacy, vol 1, ICISSP,, pp\u00a0253\u2013262. INSTICC, SciTePress","DOI":"10.5220\/0006105602530262"},{"key":"72_CR50","volume-title":"Big data: algorithms, analytics, and applications","author":"KC Li","year":"2015","unstructured":"Li KC, Jiang H, Yang LT, Cuzzocrea A (2015) Big data: algorithms, analytics, and applications, 1st edn. Chapman & Hall\/CRC, Boca Raton","edition":"1"},{"issue":"2","key":"72_CR51","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2007.48","volume":"5","author":"R Lyda","year":"2007","unstructured":"Lyda R, Hamrock J (2007) Using entropy analysis to find encrypted and packed malware. Secur Priv IEEE 5(2):40\u201345","journal-title":"Secur Priv IEEE"},{"key":"72_CR52","doi-asserted-by":"crossref","unstructured":"Maiorca D, Mercaldo F, Giacinto G, Visaggio CA, Martinelli F (2017) R-packdroid: Api package-based characterization and detection of mobile ransomware. In: Proceedings of the symposium on applied computing, pp\u00a01718\u20131723. ACM","DOI":"10.1145\/3019612.3019793"},{"key":"72_CR53","doi-asserted-by":"publisher","first-page":"2372","DOI":"10.1016\/j.procs.2017.08.216","volume":"112","author":"F Martinelli","year":"2017","unstructured":"Martinelli F, Marulli F, Mercaldo F (2017) Evaluating convolutional neural network for effective mobile malware detection. Proc Comput Sci 112:2372\u20132381","journal-title":"Proc Comput Sci"},{"key":"72_CR54","doi-asserted-by":"crossref","unstructured":"Martinelli F, Mercaldo F, Nardone V, Orlando A, Santone A (2018) Whos driving my car? a machine learning based approach to driver identification. In: ICISSP","DOI":"10.5220\/0006633403670372"},{"key":"72_CR55","doi-asserted-by":"crossref","unstructured":"Martinelli F, Mercaldo F, Nardone V, Santone A (2017) Car hacking identification through fuzzy logic algorithms. In: IEEE International Conference on fuzzy systems (FUZZ-IEEE), IEEE","DOI":"10.1109\/FUZZ-IEEE.2017.8015464"},{"key":"72_CR56","doi-asserted-by":"crossref","unstructured":"McCoy D, Bauer K, Grunwald D, Kohno T, Sicker D (2008) Shining light in dark places: understanding the tor network. In: International symposium on privacy enhancing technologies symposium, pp\u00a063\u201376. Springer","DOI":"10.1007\/978-3-540-70630-4_5"},{"key":"72_CR57","doi-asserted-by":"crossref","unstructured":"Mercaldo F, Nardone V, Santone A (2016) Ransomware inside out. In: 11th International Conference on availability, reliability and security (ARES), 2016, pp\u00a0628\u2013637. IEEE","DOI":"10.1109\/ARES.2016.35"},{"issue":"C","key":"72_CR58","doi-asserted-by":"publisher","first-page":"2519","DOI":"10.1016\/j.procs.2017.08.193","volume":"112","author":"F Mercaldo","year":"2017","unstructured":"Mercaldo F, Nardone V, Santone A (2017) Diabetes mellitus affected patients classification and diagnosis through machine learning techniques. Proc Comput Sci 112(C):2519\u20132528","journal-title":"Proc Comput Sci"},{"key":"72_CR59","doi-asserted-by":"crossref","unstructured":"Mercaldo F, Nardone V, Santone A, Visaggio CA (2016) Ransomware steals your phone. Formal methods rescue it. In: International conference on formal techniques for distributed objects, components, and systems, pp\u00a0212\u2013221. Springer","DOI":"10.1007\/978-3-319-39570-8_14"},{"key":"72_CR60","doi-asserted-by":"crossref","unstructured":"Mercaldo F, Visaggio CA, Canfora G, Cimitile A (2016) Mobile malware detection in the real world. In: IEEE\/ACM international conference on software engineering companion (ICSE-C), pp\u00a0744\u2013746. IEEE","DOI":"10.1145\/2889160.2892656"},{"issue":"11","key":"72_CR61","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/319382.319388","volume":"42","author":"TM Mitchell","year":"1999","unstructured":"Mitchell TM (1999) Machine learning and data mining. Commun ACM 42(11):30\u201336","journal-title":"Commun ACM"},{"issue":"4","key":"72_CR62","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1016\/j.patrec.2006.08.013","volume":"28","author":"JM P\u00e9rez","year":"2007","unstructured":"P\u00e9rez JM, Muguerza J, Arbelaitz O, Gurrutxaga I, Mart\u00edn JI (2007) Combining multiple class distribution modified subsamples in a single tree. Pattern Recognit Lett 28(4):414\u2013422","journal-title":"Pattern Recognit Lett"},{"key":"72_CR63","volume-title":"C4.5: programs for machine learning","author":"R Quinlan","year":"1993","unstructured":"Quinlan R (1993) C4.5: programs for machine learning. Morgan Kaufmann Publishers, San Mateo"},{"issue":"2","key":"72_CR64","first-page":"201","volume":"5","author":"A Rajput","year":"2011","unstructured":"Rajput A, Aharwal RP, Dubey M, Saxena S, Raghuvanshi M (2011) J48 and jrip rules for e-governance data. Int J Comput Sci Secur 5(2):201","journal-title":"Int J Comput Sci Secur"},{"key":"72_CR65","doi-asserted-by":"crossref","unstructured":"Samara G, Al-Salihy WA, Sures R (2010) Security issues and challenges of vehicular ad hoc networks (vanet). In: 4th International Conference on new trends in information science and service science (NISS), 2010, pp\u00a0393\u2013398. IEEE","DOI":"10.1109\/NETAPPS.2010.17"},{"key":"72_CR66","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.neunet.2014.09.003","volume":"61","author":"J Schmidhuber","year":"2015","unstructured":"Schmidhuber J (2015) Deep learning in neural networks: an overview. Neural Netw 61:85\u2013117","journal-title":"Neural Netw"},{"issue":"18","key":"72_CR67","doi-asserted-by":"publisher","first-page":"885","DOI":"10.5897\/IJPS2013.3842","volume":"8","author":"W Shahzad","year":"2013","unstructured":"Shahzad W, Asad S, Khan MA (2013) Feature subset selection using association rule mining and jrip classifier. Int J Phys Sci 8(18):885\u2013896","journal-title":"Int J Phys Sci"},{"key":"72_CR68","unstructured":"Snader R, Borisov N (2008) A tune-up for tor: improving security and performance in the tor network. In: ndss, vol\u00a08, p\u00a0127"},{"key":"72_CR69","doi-asserted-by":"crossref","unstructured":"Song S, Kim B, Lee S (2016) The effective ransomware prevention technique using process monitoring on android platform. Mobile Inform Syst","DOI":"10.1155\/2016\/2946735"},{"issue":"4","key":"72_CR70","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s11416-011-0153-9","volume":"7","author":"I Sorokin","year":"2011","unstructured":"Sorokin I (2011) Comparing files using structural entropy. J Comput Virol Hacking Tech 7(4):259\u2013265","journal-title":"J Comput Virol Hacking Tech"},{"key":"72_CR71","unstructured":"Srinivasan DB, Mekala P (2014) Mining social networking data for classification using reptree. Int J Adv Res Comput Sci Manag Stud 2(10)"},{"key":"72_CR72","doi-asserted-by":"crossref","unstructured":"Syverson P, Tsudik G, Reed M, Landwehr C (2001) Towards an analysis of onion routing security. In: Designing privacy enhancing technologies. Springer, pp\u00a096\u2013114","DOI":"10.1007\/3-540-44702-4_6"},{"key":"72_CR73","doi-asserted-by":"crossref","unstructured":"Ugarte-Pedrero X, Santos I, Sanz B, Laorden C, Bringas PG (2012) Countering entropy measure attacks on packed software detection. In: The 9th annual IEEE consumer communications and networking conference\u2014security and content protection, pp\u00a0164\u2013168","DOI":"10.1109\/CCNC.2012.6181079"},{"key":"72_CR74","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.neucom.2017.04.075","volume":"272","author":"G Villarrubia","year":"2018","unstructured":"Villarrubia G, De Paz JF, Chamoso P, De la Prieta F (2018) Artificial neural networks used in optimization problems. Neurocomputing 272:10\u201316","journal-title":"Neurocomputing"},{"key":"72_CR75","volume-title":"Decision tree grafting from the all-tests-but-one partition","author":"G Webb","year":"1999","unstructured":"Webb G (1999) Decision tree grafting from the all-tests-but-one partition. Morgan Kaufmann, San Francisco"},{"issue":"1","key":"72_CR76","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10115-007-0114-2","volume":"14","author":"X Wu","year":"2008","unstructured":"Wu X, Kumar V, Quinlan JR, Ghosh J, Yang Q, Motoda H, McLachlan GJ, Ng A, Liu B, Philip SY (2008) Top 10 algorithms in data mining. Knowl Inform Syst 14(1):1\u201337","journal-title":"Knowl Inform Syst"},{"key":"72_CR77","unstructured":"Xiao X, Zhang S, Mercaldo F, Hu G, Sangaiah AK (2017) Android malware detection based on system call sequences and lstm. Multimed Tools Appl 1\u201321"},{"key":"72_CR78","doi-asserted-by":"crossref","unstructured":"Yang T, Yang Y, Qian K, Lo DCT, Qian Y, Tao L (2015) Automated detection and analysis for android ransomware. In: IEEE 17th international conference on high performance computing and communications, IEEE 7th international symposium on cyberspace safety and security, IEEE 12th international conference on embedded software and systems, pp\u00a01338\u20131343. IEEE","DOI":"10.1109\/HPCC-CSS-ICESS.2015.39"},{"key":"72_CR79","doi-asserted-by":"crossref","unstructured":"Zhou Y, Jiang X (2012) Dissecting android malware: characterization and evolution. In: IEEE symposium on security and privacy (SP), 2012, pp\u00a095\u2013109. IEEE","DOI":"10.1109\/SP.2012.16"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40860-018-0072-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-018-0072-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-018-0072-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T22:34:41Z","timestamp":1775255681000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40860-018-0072-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,31]]},"references-count":79,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["72"],"URL":"https:\/\/doi.org\/10.1007\/s40860-018-0072-3","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"value":"2199-4668","type":"print"},{"value":"2199-4676","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,31]]},"assertion":[{"value":"2 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 October 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 October 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}