{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T09:23:49Z","timestamp":1748683429733},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/ictc.2015.7354630","type":"proceedings-article","created":{"date-parts":[[2015,12,17]],"date-time":"2015-12-17T16:56:00Z","timestamp":1450371360000},"source":"Crossref","is-referenced-by-count":7,"title":["Android botnet categorization and family detection based on behavioural and signature data"],"prefix":"10.1109","author":[{"given":"Tae","family":"Oh","sequence":"first","affiliation":[]},{"given":"Suyash","family":"Jadhav","sequence":"additional","affiliation":[]},{"given":"Young Ho","family":"Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"314","article-title":"Android Applications: Data Leaks via Advertising Libraries","author":"veelasha moonsamy","year":"2014","journal-title":"2014 International Symposium on Information Theory and its Applications ISITA"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.122"},{"key":"ref12","year":"2015","journal-title":"Plusvic github io &#x2018;YARA &#x2013; The pattern matching swiss knife for malware researchers&#x2019;"},{"key":"ref13","year":"2015","journal-title":"The Volatility Foundation &#x2013; Open Source Memory Forensics &#x2018;The Volatility Foundation &#x2013; Open Source Memory Forensics'"},{"key":"ref14","year":"2015","journal-title":"Redhat com &#x2018;Debugging code with strace | Red Hat&#x2019;"},{"key":"ref15","year":"2015","journal-title":"Developer android com &#x2018;logcat | Android Developers&#x2019;"},{"key":"ref16","year":"2015","journal-title":"Cisco &#x2018;Cisco IOS NetFlow&#x2019;"},{"key":"ref17","year":"2015","journal-title":"Cs waikato ac nz &#x2018;Weka 3 &#x2013; Data Mining with Open Source Machine Learning Software in Java&#x2019;"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2014.7073206"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2013.32"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2014.115"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2011.226"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.13"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSA.2014.10"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.091213.00134"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2013.25"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654845"}],"event":{"name":"2015 International Conference on Information and Communication Technology Convergence (ICTC)","location":"Jeju Island, South Korea","start":{"date-parts":[[2015,10,28]]},"end":{"date-parts":[[2015,10,30]]}},"container-title":["2015 International Conference on Information and Communication Technology Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7337634\/7354472\/07354630.pdf?arnumber=7354630","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T20:55:42Z","timestamp":1490388942000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7354630\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ictc.2015.7354630","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}