{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T17:55:30Z","timestamp":1725731730862},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1109\/hpcsim.2016.7568448","type":"proceedings-article","created":{"date-parts":[[2016,9,15]],"date-time":"2016-09-15T16:53:29Z","timestamp":1473958409000},"page":"1013-1018","source":"Crossref","is-referenced-by-count":3,"title":["Detection of Android malware: Combined with static analysis and dynamic analysis"],"prefix":"10.1109","author":[{"given":"Ming-Yang","family":"Su","sequence":"first","affiliation":[]},{"given":"Kek-Tung","family":"Fung","sequence":"additional","affiliation":[]},{"given":"Yu-Hao","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Ming-Zhi","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Yen-Heng","family":"Chung","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref31"},{"year":"0","key":"ref30"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ARES.2014.12"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/COMST.2014.2386139"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/HPCC.2012.258"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/1741866.1741874"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/2046614.2046619"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/MALWARE.2010.5665792"},{"year":"0","key":"ref16"},{"year":"0","key":"ref17"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/ICC.2013.6654845"},{"year":"2012","article-title":"Andrubis&#x2014;analysis of android apks","key":"ref19"},{"year":"0","key":"ref28"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/ICC.2009.5199486"},{"year":"0","key":"ref27"},{"year":"2013","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/1653662.1653691"},{"year":"0","key":"ref29"},{"year":"2011","author":"desnos","article-title":"Androguard","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/IMIS.2013.111"},{"key":"ref7","first-page":"138","article-title":"Detection of malicious applications on android OS","author":"di cerbo","year":"2010","journal-title":"International Workshop on Computational Forensics (IWCF)"},{"year":"2015","journal-title":"McAfee Labs Threats Report","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/AINA.2013.88"},{"year":"2015","key":"ref1"},{"year":"0","key":"ref20"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1016\/j.cose.2015.05.001"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1007\/s10207-014-0250-0"},{"year":"0","key":"ref24"},{"year":"0","key":"ref23"},{"year":"0","key":"ref26"},{"year":"0","key":"ref25"}],"event":{"name":"2016 International Conference on High Performance Computing & Simulation (HPCS)","start":{"date-parts":[[2016,7,18]]},"location":"Innsbruck, Austria","end":{"date-parts":[[2016,7,22]]}},"container-title":["2016 International Conference on High Performance Computing &amp; Simulation (HPCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7562293\/7568299\/07568448.pdf?arnumber=7568448","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T22:50:33Z","timestamp":1476226233000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7568448\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/hpcsim.2016.7568448","relation":{},"subject":[],"published":{"date-parts":[[2016,7]]}}}