{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:15:31Z","timestamp":1725513331926},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/ic3.2015.7346711","type":"proceedings-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T17:17:05Z","timestamp":1449595025000},"page":"383-388","source":"Crossref","is-referenced-by-count":3,"title":["Heterogeneous feature space for Android malware detection"],"prefix":"10.1109","author":[{"family":"Varsha M V","sequence":"first","affiliation":[]},{"family":"Vinod P","sequence":"additional","affiliation":[]},{"family":"Dhanya K A","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2015.02.001"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"ref13","article-title":"Detecting and classifying android malware using static analysis along with creator information","author":"kang","year":"2014","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"ref14","article-title":"Dwroiddump: Executable code extraction from android applications for malware analysis","author":"kim","year":"2014","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982389"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382224"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.211"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295141"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0148-x"},{"year":"0","key":"ref4"},{"year":"0","key":"ref3"},{"year":"0","key":"ref6"},{"year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"year":"0","key":"ref2"},{"year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480701"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2353996"}],"event":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","start":{"date-parts":[[2015,8,20]]},"location":"Noida, India","end":{"date-parts":[[2015,8,22]]}},"container-title":["2015 Eighth International Conference on Contemporary Computing (IC3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7337021\/7346637\/07346711.pdf?arnumber=7346711","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T21:18:16Z","timestamp":1490390296000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7346711\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/ic3.2015.7346711","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}