{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:31:52Z","timestamp":1770222712530,"version":"3.49.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/cybersecpods.2016.7502343","type":"proceedings-article","created":{"date-parts":[[2016,8,12]],"date-time":"2016-08-12T00:33:28Z","timestamp":1470962008000},"page":"1-7","source":"Crossref","is-referenced-by-count":73,"title":["N-opcode analysis for android malware classification and categorization"],"prefix":"10.1109","author":[{"given":"Boojoong","family":"Kang","sequence":"first","affiliation":[]},{"given":"Suleiman Y.","family":"Yerima","sequence":"additional","affiliation":[]},{"given":"Kieran","family":"Mclaughlin","sequence":"additional","affiliation":[]},{"given":"Sakir","family":"Sezer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2513228.2513295"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.57"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5220\/0005537800270038"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.103"},{"key":"ref15","article-title":"App-ray: user-driven and fully automated android app security assessment","author":"titze","year":"2013","journal-title":"Fraunhofer AISEC TechReport"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348563"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2013.0095"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSN.2012.43"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33704-8_21"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud.2014.22"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12280-9_13"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33018-6_30"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SAI.2015.7237302"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2014.0099"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0148-x"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883436"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27503-6_22"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-014-0226-7"},{"key":"ref22","first-page":"62","article-title":"DroidMat: Android malware detection through manifest and API calls tracing","author":"dong-jie","year":"2012","journal-title":"Seventh Asia Joint Conf on Information Security (Asia JCIS"},{"key":"ref21","article-title":"C4.5: Programs for machine learning","author":"quinlan","year":"1993","journal-title":"Morgan Kaufmann"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"ref23","year":"0","journal-title":"VirusTotal"},{"key":"ref26","year":"0","journal-title":"baksmali"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security)","location":"London, United Kingdom","start":{"date-parts":[[2016,6,13]]},"end":{"date-parts":[[2016,6,14]]}},"container-title":["2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7502239\/7502334\/07502343.pdf?arnumber=7502343","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,28]],"date-time":"2016-09-28T17:30:11Z","timestamp":1475083811000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7502343\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/cybersecpods.2016.7502343","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}