{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T19:16:17Z","timestamp":1719861377308},"reference-count":37,"publisher":"Elsevier","isbn-type":[{"value":"9780124115194","type":"print"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1016\/b978-0-12-411519-4.00010-0","type":"book-chapter","created":{"date-parts":[[2015,9,11]],"date-time":"2015-09-11T19:04:44Z","timestamp":1441998284000},"page":"257-283","source":"Crossref","is-referenced-by-count":4,"title":["Mining Android Apps for Anomalies"],"prefix":"10.1016","author":[{"given":"Konstantin","family":"Kuznetsov","sequence":"first","affiliation":[]},{"given":"Alessandra","family":"Gorla","sequence":"additional","affiliation":[]},{"given":"Ilaria","family":"Tavecchia","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Gro\u00df","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Zeller","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0010","series-title":"ACM\/IEEE international conference on software engineering (ICSE)","first-page":"1025","article-title":"Checking app behavior against app descriptions","author":"Gorla","year":"2014"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0015","series-title":"Introduction to information retrieval","author":"Manning","year":"2008"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0020","first-page":"993","article-title":"Latent Dirichlet allocation","volume":"3","author":"Blei","year":"2014","journal-title":"J Mach Learn Res"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0025","series-title":"Mallet: a machine learning for language toolkit","author":"McCallum","year":"2002"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0030","first-page":"281","article-title":"Some methods for classification and analysis of multivariate observations","volume":"1","author":"MacQueen","year":"1967"},{"issue":"1","key":"10.1016\/B978-0-12-411519-4.00010-0_bb0035","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/0377-0427(87)90125-7","article-title":"Silhouettes: a graphical aid to the interpretation and validation of cluster analysis","volume":"20","author":"Rousseeuw","year":"1987","journal-title":"J Comput Appl Math"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0040","series-title":"ACM conference on computer and communications security (CCS)","first-page":"627","article-title":"Android permissions demystified","author":"Felt","year":"2011"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0045","series-title":"Introduction to modern information retrieval","author":"Salton","year":"1983"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0050","series-title":"Proceedings of the 24rd international conference on very large data bases (VLDB)","first-page":"392","article-title":"Algorithms for mining distance-based outliers in large datasets","author":"Knorr","year":"1998"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0055","series-title":"Proceedings of the 2000 ACM SIGMOD international conference on management of data (SIGMOD)","first-page":"427","article-title":"Efficient algorithms for mining outliers from large data sets","author":"Ramaswamy","year":"2000"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0060","series-title":"Proceedings of the 6th European conference on principles of data mining and knowledge discovery (PKDD)","first-page":"15","article-title":"Fast outlier detection in high dimensional spaces","author":"Angiulli","year":"2002"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0065","series-title":"9th ACM SIGKDD international conference on knowledge discovery and data mining (KDD)","first-page":"29","article-title":"Mining distance-based outliers in near linear time with randomization and a simple pruning rule","author":"Bay","year":"2003"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0070","series-title":"11th SIAM international conference on data mining (SDM), SIAM","first-page":"13","article-title":"Interpreting and unifying outlier scores","author":"Hans-Peter Kriegel","year":"2011"},{"issue":"7","key":"10.1016\/B978-0-12-411519-4.00010-0_bb0075","doi-asserted-by":"crossref","first-page":"1443","DOI":"10.1162\/089976601750264965","article-title":"Estimating the support of a high-dimensional distribution","volume":"13","author":"Sch\u00f6lkopf","year":"2001","journal-title":"Neural Comput"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0080","first-page":"139","article-title":"One-class SVMs for document classification","volume":"2","author":"Manevitz","year":"2002","journal-title":"J Mach Learn Res"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0085","series-title":"ICDM workshop on data mining for computer security (DMSEC)","article-title":"One class support vector machines for detecting anomalous windows registry accesses","author":"Heller","year":"2003"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0090","first-page":"40","article-title":"Kernel whitening for one-class classification","volume":"2388","author":"Tax","year":"2002"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0095","series-title":"Learning with kernels: support vector machines, regularization, optimization, and beyond","author":"Sch\u00f6lkopf","year":"2001"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0100","series-title":"NIPS workshop on Statistical methods for computational experiments in visual processing and computer vision","article-title":"Appearance-based object recognition using svms: which kernel should I use?","author":"Caputo","year":"2002"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0105","series-title":"Multidimensional scaling","author":"Cox","year":"2001"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0110","series-title":"IEEE symposium on security and privacy (SP)","first-page":"95","article-title":"Dissecting Android malware: characterization and evolution","author":"Zhou","year":"2012"},{"issue":"8","key":"10.1016\/B978-0-12-411519-4.00010-0_bb0115","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","article-title":"Introduction to roc analysis","volume":"27","author":"Fawcett","year":"2006","journal-title":"Pattern Recogn Lett"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0120","series-title":"Proceedings of the fourteenth international conference on machine learning","first-page":"179","article-title":"Addressing the curse of imbalanced training sets: one-sided selection","author":"Kubat","year":"1997"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0125","series-title":"ACM\/IEEE international conference on software engineering (ICSE)","first-page":"241","article-title":"Taming reflection: aiding static analysis in the presence of reflection and custom class loaders","author":"Bodden","year":"2011"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0130","series-title":"ACM\/IEEE international conference on software engineering (ICSE)","first-page":"1036","article-title":"Asdroid: detecting stelthy behaviors in android applications by user interface and program behavior contradiction","author":"Huang","year":"2014"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0135","series-title":"USENIX Security Symposium","first-page":"527","article-title":"WHYPER towards automating risk assessment of mobile applications","author":"Pandita","year":"2013"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0140","series-title":"IEEE working conference on mining software repositories (MSR)","first-page":"108","article-title":"App store mining and analysis: MSR for app stores","author":"Harman","year":"2012"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0145","series-title":"ACM conference on ubiquitous computing (UbiComp)","first-page":"501","article-title":"Expectation and purpose: understanding users\u2019 mental models of mobile app privacy through crowdsourcing","author":"Lin","year":"2012"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0150","series-title":"ACM SIGOPS symposium on operating systems principles (SOSP)","first-page":"145","article-title":"\/* iComment: Bugs or bad comments? *\/","author":"Tan","year":"2007"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0155","series-title":"European conference on object-oriented programming (ECOOP)","first-page":"294","article-title":"Debugging method names","author":"H\u00f8st","year":"2009"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0160","series-title":"ACM\/IEEE international conference on software engineering (ICSE)","article-title":"Inferring method specifications from natural language API descriptions","author":"Pandita","year":"2012"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0165","series-title":"USENIX conference on operating systems design and implementation (OSDI), USENIX Association","first-page":"1","article-title":"TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones","author":"Enck","year":"2010"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0170","series-title":"ACM annual international conference on mobile computing and networking (MobiCom)","first-page":"137","article-title":"ProfileDroid: multi-layer profiling of Android applications","author":"Wei","year":"2012"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0175","series-title":"International workshop on automation of software test (AST)","first-page":"77","article-title":"Automating GUI testing for Android applications","author":"Hu","year":"2011"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0180","series-title":"International conference on fundamental approaches to software engineering (FASE)","first-page":"250","article-title":"A grey-box approach for automated GUI-model generation of mobile applications","author":"Yang","year":"2013"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0185","series-title":"European software engineering conference held jointly with ACM SIGSOFT international symposium on foundations of software engineering (ESEC\/FSE)","first-page":"224","article-title":"Dynodroid: an input generation system for Android apps","author":"Machiry","year":"2013"},{"key":"10.1016\/B978-0-12-411519-4.00010-0_bb0190","series-title":"IEEE\/ACM international conference on automated software engineering (ASE)","first-page":"258","article-title":"Using GUI ripping for automated testing of Android applications","author":"Amalfitano","year":"2012"}],"container-title":["The Art and Science of Analyzing Software Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780124115194000100?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780124115194000100?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,19]],"date-time":"2018-09-19T14:51:29Z","timestamp":1537368689000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780124115194000100"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9780124115194"],"references-count":37,"URL":"https:\/\/doi.org\/10.1016\/b978-0-12-411519-4.00010-0","relation":{},"subject":[],"published":{"date-parts":[[2015]]}}}