{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:17:29Z","timestamp":1775002649102,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679403","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"348-353","source":"Crossref","is-referenced-by-count":2,"title":["Identifying Android Banking Malware Through Measurement of User Interface Complexity"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8566-7108","authenticated-orcid":false,"given":"Sean","family":"McElroy","sequence":"first","affiliation":[{"name":"Beacom College of Computer and Cyber Sciences, Dakota State University,Madison,USA"}]}],"member":"263","reference":[{"key":"ref1","first-page":"100358","article-title":"A survey of malware detection in Android apps: Recommendations and perspectives for future research","volume-title":"Computer Science Review","volume":"39","author":"Razgallah","year":"2021"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1145\/3029806.3029825","article-title":"DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware","volume-title":"Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, ser. CODASPY 17","author":"Suarez-Tangil","year":"2017"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2746266.2746271"},{"key":"ref4","first-page":"216671","article-title":"A Comprehensive Analysis of the Android Permissions System","volume-title":"IEEE Access","volume":"8","author":"Almomani","year":"2020"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.10.011"},{"key":"ref6","volume-title":"NVD - CVE-2023\u201320963","year":"2023"},{"key":"ref7","article-title":"Pinduoduo App Malware Detailed by Cy-bersecurity Researchers","volume-title":"Bloomberg. com","author":"Zheng","year":"2023"},{"key":"ref8","volume-title":"Develop a UI with Views | Android Studio","year":"2023"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029823"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3290480.3290493"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00195"},{"issue":"P-256","key":"ref12","first-page":"79","article-title":"Comparative evaluation of machine learning-based malware detection on android","author":"Hahn","year":"2016","journal-title":"Sicherheit 2016: Sicherheit, Schutz und Zuverlassigkeit: Konferenzband der 8. Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft fur In-formatik e. V. (GI): 5. - 7. April 2016 in Bonn, ser. GI-Edition Lecture Notes in Informatics Proceedings. Bonn: Gesellschaft fur Informatik e.V. (GI)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0148-x"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480701"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3150376.3150378"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2931021.2931026"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00037"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43839-8"},{"key":"ref19","first-page":"515","article-title":"Dynamic Android Malware Category Classification using Semi-Supervised Deep Learning","volume-title":"2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASCIPiCom\/CBDComICyberSciTech)","author":"Mahdavifar"},{"issue":"1","key":"ref20","first-page":"22","article-title":"Effective and Efficient Hybrid Android Malware Classification Using Pseudo-Label Stacked Auto-Encoder","volume-title":"Journal of Network and Systems Management","volume":"30","author":"Mahdavifar","year":"2022"},{"key":"ref21","volume-title":"Apktool","author":"Tumbleson","year":"2010"},{"key":"ref22","volume-title":"droid-res-parser","year":"2023"},{"key":"ref23","volume-title":"Applied logistic regression, 2nd ed., ser. Wiley series in probability and statistics","author":"Hosmer","year":"2000"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2014.23247","article-title":"Drebin: Effective and Explainable Detection of Android Malware in Your Pocket","volume-title":"Proceedings 2014 Network and Distributed System Security Symposium","author":"Arp","year":"2014"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23353"},{"issue":"2","key":"ref26","first-page":"998","article-title":"Android Security: A Survey of Issues, Malware Penetration, and Defenses","volume-title":"IEEE Communications Surveys & Tutorials","volume":"17","author":"Faruki","year":"2015"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"London, United Kingdom","start":{"date-parts":[[2024,9,2]]},"end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679403.pdf?arnumber=10679403","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T04:58:03Z","timestamp":1727240283000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679403\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679403","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}