{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T20:02:11Z","timestamp":1760472131938,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1109\/iccnc.2013.6504180","type":"proceedings-article","created":{"date-parts":[[2013,4,26]],"date-time":"2013-04-26T17:30:11Z","timestamp":1366997411000},"page":"740-744","source":"Crossref","is-referenced-by-count":28,"title":["A neural network approach to category validation of Android applications"],"prefix":"10.1109","author":[{"given":"M.","family":"Ghorbanzadeh","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"family":"Yang Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"family":"Zhongmin Ma","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"T. C.","family":"Clancy","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R.","family":"McGwier","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","article-title":"Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones","author":"enck","year":"2010","journal-title":"Proceedings of the Fifth USENIX Symposium on Operating Systems Design and Implementation"},{"key":"17","article-title":"Crepe: Context-related policy enforcement for android","author":"conti","year":"2010","journal-title":"Proceedings of the 13th Information Security Conference ISC"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.1145\/1755688.1755732","article-title":"Apex: Extending android permission model and enforcement with user-defined runtime constraints","author":"nauman","year":"2010","journal-title":"Proceedings of ASIACCS"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184500"},{"key":"16","first-page":"193","article-title":"Gauss-newton approximation to bayesian learning","volume":"3","author":"foresee","year":"1997","journal-title":"In Proceedings of International Joint Conference on Neural Networks"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.1109\/5.58325","article-title":"Self-organizing networks","author":"kohonen","year":"1990","journal-title":"In Proceedings of the IEEE"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046623"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0148-x"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920313"},{"key":"22","article-title":"Some methods for classification and analysis of multivariate observations","author":"macqueen","year":"1967","journal-title":"Proc Berkeley Symp Math Statist Probab"},{"key":"23","article-title":"Scandroid: Automated security certification of androidapplications","author":"fuchs","year":"2009","journal-title":"Technical Report University of Maryland"},{"year":"0","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866317"},{"year":"0","author":"play","key":"26"},{"year":"2012","key":"27"},{"key":"28","volume":"4","author":"mackay","year":"1992","journal-title":"Bayesian Interpolation Neural Computation"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1992.4.1.1"},{"year":"0","key":"3"},{"year":"2011","key":"2"},{"key":"10","article-title":"Neural networks and natural intelligence","author":"grossberg","year":"1988","journal-title":"MIT Press"},{"year":"0","key":"1"},{"journal-title":"Neural Network ToolboxTM R2012b","year":"2012","author":"beale","key":"30"},{"journal-title":"Malicious Software for Smartphones[R]","year":"2008","author":"schmidt","key":"7"},{"year":"0","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2007.381933"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359550"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2007.358929"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0022-0"}],"event":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC 2013)","start":{"date-parts":[[2013,1,28]]},"location":"San Diego, CA","end":{"date-parts":[[2013,1,31]]}},"container-title":["2013 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6495637\/6504039\/06504180.pdf?arnumber=6504180","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,12]],"date-time":"2019-07-12T21:53:41Z","timestamp":1562968421000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6504180\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/iccnc.2013.6504180","relation":{},"subject":[],"published":{"date-parts":[[2013,1]]}}}