{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:11:36Z","timestamp":1771697496105,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/icc.2009.5199486","type":"proceedings-article","created":{"date-parts":[[2009,8,11]],"date-time":"2009-08-11T20:20:30Z","timestamp":1250022030000},"page":"1-5","source":"Crossref","is-referenced-by-count":153,"title":["Static Analysis of Executables for Collaborative Malware Detection on Android"],"prefix":"10.1109","author":[{"given":"A.-D.","family":"Schmidt","sequence":"first","affiliation":[]},{"given":"R.","family":"Bye","sequence":"additional","affiliation":[]},{"given":"H.-G.","family":"Schmidt","sequence":"additional","affiliation":[]},{"given":"J.","family":"Clausen","sequence":"additional","affiliation":[]},{"given":"O.","family":"Kiraz","sequence":"additional","affiliation":[]},{"given":"K. A.","family":"Yuksel","sequence":"additional","affiliation":[]},{"given":"S. A.","family":"Camtepe","sequence":"additional","affiliation":[]},{"given":"S.","family":"Albayrak","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/IWIA.2005.1"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024600519144"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986877"},{"key":"15","first-page":"288","article-title":"a virus prevention model based on static analysis and data mining methods","author":"wang","year":"2008","journal-title":"Computer and Information Technology Workshops"},{"key":"16","article-title":"data mining methods for detection of new malicious executables","author":"eleazar eskin","year":"2001","journal-title":"Proceedings of the 2001 IEEE Symposium on Security and Privacy"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.9"},{"key":"14","year":"0"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.319"},{"key":"12","year":"0"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199486"},{"key":"20","year":"0"},{"key":"22","year":"0"},{"key":"23","year":"0"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(87)80003-2"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.237"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2007.358929"},{"key":"2","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1049\/ess:20040612","article-title":"embedded devices next on the virus target list","volume":"2","author":"piercy","year":"2004","journal-title":"Electronics Systems and Software"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2004.1378409"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2004.21"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378626"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.MOBILWARE2008.2492"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/49.622919"},{"key":"4","article-title":"cloudav: n-version antivirus in the network cloud","author":"oberheide","year":"2008","journal-title":"Proceedings of the 17th USENIX Security Symposium (Security'08)"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378627"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2005.86"}],"event":{"name":"ICC 2009 - 2009 IEEE International Conference on Communications","location":"Dresden, Germany","start":{"date-parts":[[2009,6,14]]},"end":{"date-parts":[[2009,6,18]]}},"container-title":["2009 IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5198563\/5198564\/05199486.pdf?arnumber=5199486","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T22:44:39Z","timestamp":1497825879000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5199486\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icc.2009.5199486","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}