{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:37:51Z","timestamp":1730248671074,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1109\/icit.2019.8755048","type":"proceedings-article","created":{"date-parts":[[2019,7,4]],"date-time":"2019-07-04T22:14:55Z","timestamp":1562278495000},"page":"1161-1166","source":"Crossref","is-referenced-by-count":5,"title":["Mobile Malware Detection: An Analysis of Deep Learning Model"],"prefix":"10.1109","author":[{"given":"Mahbub E","family":"Khoda","sequence":"first","affiliation":[]},{"given":"Joarder","family":"Kamruzzaman","sequence":"additional","affiliation":[]},{"given":"Iqbal","family":"Gondal","sequence":"additional","affiliation":[]},{"given":"Tasadduq","family":"Imam","sequence":"additional","affiliation":[]},{"given":"Ashfaqur","family":"Rahman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.50"},{"key":"ref11","article-title":"Context-aware, adaptive and scalable android malware detection through online learning (extended version)","volume":"abs 1706 947","author":"narayanan","year":"2017","journal-title":"CoRR"},{"key":"ref12","article-title":"A multi-view context-aware approach to android malware detection and malicious code localization","author":"narayanan","year":"2017","journal-title":"Empirical Software Engineering"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2523912"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.11.007"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-014-0226-7"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2875475.2875487"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2016.10.012"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2631434"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SARNOF.2016.7846747"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/S0965-9978(98)00071-4"},{"year":"0","key":"ref4","article-title":"Mobile malware evolution 2017"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/0893-6080(94)90030-2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3041008.3041010"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2013.111"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2013.0095"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1561\/2000000039"},{"year":"0","key":"ref2","article-title":"Number of android devices"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"year":"0","key":"ref1","article-title":"Internet of everything (ioe)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2016.7399288"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029823"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0070"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2006.18.7.1527"},{"key":"ref23","first-page":"153","article-title":"Greedy layer-wise training of deep networks","author":"bengio","year":"2007","journal-title":"Advances in neural information processing systems"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04212-7_43"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cct.2013.06.011"}],"event":{"name":"2019 IEEE International Conference on Industrial Technology (ICIT)","start":{"date-parts":[[2019,2,13]]},"location":"Melbourne, Australia","end":{"date-parts":[[2019,2,15]]}},"container-title":["2019 IEEE International Conference on Industrial Technology (ICIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8746085\/8754907\/08755048.pdf?arnumber=8755048","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:18:58Z","timestamp":1657855138000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8755048\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icit.2019.8755048","relation":{},"subject":[],"published":{"date-parts":[[2019,2]]}}}