{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:40:43Z","timestamp":1761324043732},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1109\/icoin.2016.7427158","type":"proceedings-article","created":{"date-parts":[[2016,3,28]],"date-time":"2016-03-28T17:06:26Z","timestamp":1459184786000},"page":"455-457","source":"Crossref","is-referenced-by-count":5,"title":["A study on behavior-based mobile malware analysis system against evasion techniques"],"prefix":"10.1109","author":[{"given":"Mijoo","family":"Kim","sequence":"first","affiliation":[]},{"given":"Tae Jin","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Youngsang","family":"Shin","sequence":"additional","affiliation":[]},{"given":"Heung Youl","family":"Youm","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Dissection the Android Bouncer","author":"oberheide","year":"2012","journal-title":"Summer"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2592791.2592796"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590325"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664250"},{"year":"0","key":"ref4"},{"year":"2012","key":"ref3","article-title":"Android and Security"},{"year":"0","key":"ref6"},{"year":"0","key":"ref5"},{"year":"0","key":"ref8"},{"year":"0","key":"ref7"},{"journal-title":"Kaspersky Lab&IN1EIPOLlointRetxrt","article-title":"Mobilecyber Threats","year":"2014","key":"ref2"},{"journal-title":"IDC","year":"0","key":"ref1"},{"year":"0","author":"apk","key":"ref9"}],"event":{"name":"2016 International Conference on Information Networking (ICOIN)","start":{"date-parts":[[2016,1,13]]},"location":"Kota Kinabalu, Malaysia","end":{"date-parts":[[2016,1,15]]}},"container-title":["2016 International Conference on Information Networking (ICOIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7422341\/7427058\/7427158.pdf?arnumber=7427158","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T21:16:44Z","timestamp":1475183804000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7427158\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icoin.2016.7427158","relation":{},"subject":[],"published":{"date-parts":[[2016,1]]}}}