{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T20:04:31Z","timestamp":1760472271009,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/icc.2014.6883436","type":"proceedings-article","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T14:10:33Z","timestamp":1409753433000},"page":"914-919","source":"Crossref","is-referenced-by-count":54,"title":["Using opcode-sequences to detect malicious Android applications"],"prefix":"10.1109","author":[{"given":"Quentin","family":"Jerome","sequence":"first","affiliation":[]},{"given":"Kevin","family":"Allix","sequence":"additional","affiliation":[]},{"given":"Radu","family":"State","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Juxtapp A Scalable System for Detecting Code Reuse among Android Applications","year":"0","author":"hanna","key":"19"},{"key":"17","article-title":"Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets","author":"zhou","year":"2012","journal-title":"19th Annual Network and"},{"year":"0","key":"18"},{"journal-title":"C5 0 Machine Learning Algorithm","year":"0","key":"15"},{"key":"16","first-page":"1871","article-title":"Liblinear: A library for large linear classification","author":"fan","year":"2008","journal-title":"The Journal of Machine Learning Research"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"11","article-title":"Opcode sequences as representation of executables for datamining-based unknown malware detection","author":"santos","year":"2011","journal-title":"Information Sciences"},{"key":"12","first-page":"50","volume":"6694","author":"santos","year":"2011","journal-title":"Opcodesequence-based Semi-supervised Unknown Malware Detection"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0148-x"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"25","first-page":"1011","author":"isohara","year":"2011","journal-title":"Kernel-based Behavior Analysis for Android Malware Detection"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2011.6112328"},{"key":"27","first-page":"15","article-title":"Crowdroid: Behaviorbased malware detection system for android","author":"burguera","year":"2011","journal-title":"Science"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.298"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"year":"0","key":"3"},{"journal-title":"Kaspersky Security Bulletin","year":"2012","key":"2"},{"key":"10","first-page":"35","volume":"5965","author":"santos","year":"2010","journal-title":"Opcode-sequence-based Malware Detection"},{"journal-title":"Android Devices Statistics","year":"0","key":"1"},{"key":"30","doi-asserted-by":"crossref","DOI":"10.1145\/2414456.2414498","article-title":"Addroid: Privilege separation for applications and advertisers in android","author":"pearce","year":"2012","journal-title":"Proceedings of ASIACCS"},{"key":"7","doi-asserted-by":"crossref","first-page":"317","DOI":"10.5220\/0001863603170320","article-title":"N-grams-based file signatures for malware detection","volume":"aidss","author":"santos","year":"2009","journal-title":"Proceedings of the 11th International Conference on Enterprise Information Systems (ICEIS)"},{"journal-title":"Dalvik Bytecode Obfuscation on Android","year":"0","key":"6"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_5"},{"key":"5","first-page":"61","article-title":"A survey on automated dynamic malware-analysis techniques and tools","author":"egele","year":"2008","journal-title":"ACM Comput Surv"},{"journal-title":"Code Protection in Android","year":"2012","author":"patrick","key":"31"},{"key":"4","article-title":"Dissecting the android bouncer","author":"oberheide","year":"2012","journal-title":"Summer-Con2012"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2012.34"},{"key":"8","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1007\/978-3-540-89900-6_21","article-title":"Unknown malcode detection using opcode representation","author":"moskovitch","year":"2008","journal-title":"Intelligence and Security Informatics"}],"event":{"name":"ICC 2014 - 2014 IEEE International Conference on Communications","start":{"date-parts":[[2014,6,10]]},"location":"Sydney, NSW","end":{"date-parts":[[2014,6,14]]}},"container-title":["2014 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6878057\/6883277\/06883436.pdf?arnumber=6883436","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T16:38:22Z","timestamp":1565800702000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6883436\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icc.2014.6883436","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}