{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:27:53Z","timestamp":1771025273754,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/iscc.2015.7405598","type":"proceedings-article","created":{"date-parts":[[2016,2,15]],"date-time":"2016-02-15T19:54:13Z","timestamp":1455566053000},"page":"714-720","source":"Crossref","is-referenced-by-count":46,"title":["Fest: A feature extraction and selection tool for Android malware detection"],"prefix":"10.1109","author":[{"given":"Kai","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Dafang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Su","sequence":"additional","affiliation":[]},{"given":"Wenjia","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","year":"0","journal-title":"WEKA"},{"key":"ref11","author":"desnos","year":"2013","journal-title":"Androguard Reverse engineering Malware and goodware analysis of Android applications"},{"key":"ref12","first-page":"2","article-title":"A study of android application security","volume":"2","author":"enck","year":"2011","journal-title":"USENIX Security Symposium"},{"key":"ref13","article-title":"S-candroid: Automated security certification of android","author":"fuchs","year":"2009","journal-title":"IEEE Security & Privacy"},{"key":"ref14","first-page":"291","author":"gibler","year":"2012","journal-title":"AndroidLeaks automatically detecting potential privacy leaks in android applications on a large scale"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WCSE.2012.26"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2494522"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435379"},{"key":"ref19","first-page":"3","article-title":"Foster, and Todd Millstein. Dr. android and mr. hide: fine-grained permissions in android applications","author":"jinseong","year":"2012","journal-title":"Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref6","year":"0"},{"key":"ref5","first-page":"86","author":"aafer","year":"2013","journal-title":"Droid APIMiner Mining API-Level Features for Robust Malware Detection in Android"},{"key":"ref8","article-title":"Systematic detection of capability leaks in stock android smart-phones","author":"grace","year":"2012","journal-title":"NDSS"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"ref1","year":"0","journal-title":"Mobile Threat Report"},{"key":"ref9","year":"0","journal-title":"Android Basebridge?Symantec"}],"event":{"name":"2015 20th IEEE Symposium on Computers and Communication (ISCC)","location":"Larnaca","start":{"date-parts":[[2015,7,6]]},"end":{"date-parts":[[2015,7,9]]}},"container-title":["2015 IEEE Symposium on Computers and Communication (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7397314\/7405441\/07405598.pdf?arnumber=7405598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T03:16:13Z","timestamp":1490325373000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7405598\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iscc.2015.7405598","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}