{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:15:43Z","timestamp":1730268943577,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/iotsms.2018.8554580","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T00:54:17Z","timestamp":1543884857000},"page":"239-243","source":"Crossref","is-referenced-by-count":0,"title":["Na\u00efve Bayesian and Fuzzy C-Means Algorithm for Mobile Malware Detection Precision"],"prefix":"10.1109","author":[{"given":"Abdul","family":"Razaque","sequence":"first","affiliation":[]},{"given":"Zhou","family":"Xihao","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Liangjie","sequence":"additional","affiliation":[]},{"given":"Muder","family":"Almiani","sequence":"additional","affiliation":[]},{"given":"Yaser","family":"Jararweh","sequence":"additional","affiliation":[]},{"given":"Meer Jaro","family":"Khan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"13492","DOI":"10.1016\/j.eswa.2012.07.009","article-title":"A network intrusion detection system based on a Hidden Na&#x00EF;ve Bayes multiclass classifier","volume":"39","author":"levent","year":"2012","journal-title":"Expert Systems with Applications"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"961","DOI":"10.1109\/SURV.2013.101613.00077","article-title":"Evolution, detection and analysis of malware for smart devices","volume":"16","author":"guillermo","year":"2014","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref12","article-title":"A review of wearable sensors and systems with application in rehabilitation","volume":"9","author":"shyamal","year":"2012","journal-title":"Journal of NeuroEngineering and Rehabilitation"},{"key":"ref13","first-page":"256","article-title":"Performance analysis of Naive Bayes and J48 classification algorithm for data classification","volume":"6","author":"tina","year":"2013","journal-title":"International Journal of Computer Science and Applications"},{"year":"2011","author":"dafydd","journal-title":"The Web Application Hacker's Handbook Finding and Exploiting Security Flaws","key":"ref4"},{"key":"ref3","article-title":"Research on Static Analysis Technology of Android Application Security Defects","author":"lu","year":"2016","journal-title":"DEStech Transactions on Engineering and Technology Research"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"13492","DOI":"10.1016\/j.eswa.2012.07.009","article-title":"A network intrusion detection system based on a Hidden Na&#x00EF;ve Bayes multiclass classifier","volume":"39","author":"levent","year":"2012","journal-title":"Expert Systems with Applications"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s10844-010-0148-x","article-title":"Andromaly&#x201D;: a behavioral malware detection framework for android devices","volume":"38","author":"asaf","year":"2012","journal-title":"Journal of Intelligent Information Systems"},{"key":"ref8","first-page":"961","article-title":"Image segmentation by generalized hierarchical fuzzy C-means algorithm","volume":"28","author":"yuhui","year":"2015","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"ref7","first-page":"37","article-title":"Is Naive Bayes a good classifier for document classification","volume":"5","author":"ting","year":"2011","journal-title":"International Journal of Software Engineering and Its Applications"},{"key":"ref2","first-page":"84","article-title":"Android malware detection based on static analysis of characteristic tree","author":"qi","year":"2015","journal-title":"2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1007\/s11859-012-0864-x","article-title":"Research on android malware detection and interception based on behavior monitoring","volume":"17","author":"guojun","year":"2012","journal-title":"Wuhan University Journal of Natural Sciences"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1835","DOI":"10.1016\/j.eswa.2010.07.112","article-title":"Fuzzy C-means and fuzzy swarm for fuzzy clustering problem","volume":"38","author":"hesam","year":"2011","journal-title":"Expert Systems with Applications"}],"event":{"name":"2018 Fifth International Conference on Internet of Things: Systems, Management and Security (IoTSMS)","start":{"date-parts":[[2018,10,15]]},"location":"Valencia","end":{"date-parts":[[2018,10,18]]}},"container-title":["2018 Fifth International Conference on Internet of Things: Systems, Management and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8537438\/8554379\/08554580.pdf?arnumber=8554580","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T02:56:05Z","timestamp":1548384965000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8554580\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/iotsms.2018.8554580","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}