{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:42:31Z","timestamp":1725810151362},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T00:00:00Z","timestamp":1718755200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T00:00:00Z","timestamp":1718755200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,19]]},"DOI":"10.1109\/jcsse61278.2024.10613705","type":"proceedings-article","created":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T17:20:13Z","timestamp":1722619213000},"page":"482-487","source":"Crossref","is-referenced-by-count":0,"title":["Malware Classification for Mobile Application Using Permission Manifest"],"prefix":"10.1109","author":[{"given":"Warasit","family":"Changrangkarn","sequence":"first","affiliation":[{"name":"Thammasat University,Faculty of Science and Technology,Department of Computer Science,Pathumthani,Thailand"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pakorn","family":"Leesutthipornchai","sequence":"additional","affiliation":[{"name":"Thammasat University,Faculty of Science and Technology,Department of Computer Science,Pathumthani,Thailand"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"volume-title":"What is an application?","year":"2023","author":"Gillis","key":"ref1"},{"volume-title":"Mobile malware evolution 2019","year":"2023","key":"ref2"},{"volume-title":"Privacy and Security Developer Policy Center","key":"ref3"},{"volume-title":"DroidFusion: A Novel Multilevel Classifier Fusion Approach for Android Malware Detection","key":"ref4"},{"volume-title":"Permissions on Android","key":"ref5"},{"volume-title":"A tool for reverse engineering Android apk files","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INDICON49873.2020.9342511"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/itnec.2019.8729017"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/trustcom.2016.0087"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"volume-title":"Dataset malware\/beningn permissions dataset","key":"ref11"},{"journal-title":"New results on permission based static analysis for Android malware","year":"2018","author":"Ozkan Sahm","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CCET.2018.8542215"},{"volume-title":"DroidDet: Effective and robust detection of android malware using static analysis along with rotation forest model","year":"2018","author":"Hui-Juan","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.03.170"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/trustcom.2016.0087"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1145\/3194244.3194257","volume-title":"Adaptive Android Malware Signature Detection","author":"Ngamwitroj","year":"2018"},{"volume-title":"One-Hot Encoding or One-Hot encoder Dummies for Classification model","year":"2024","author":"Chaiyadecha","key":"ref18"}],"event":{"name":"2024 21st International Joint Conference on Computer Science and Software Engineering (JCSSE)","start":{"date-parts":[[2024,6,19]]},"location":"Phuket, Thailand","end":{"date-parts":[[2024,6,22]]}},"container-title":["2024 21st International Joint Conference on Computer Science and Software Engineering (JCSSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10613603\/10613624\/10613705.pdf?arnumber=10613705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,3]],"date-time":"2024-08-03T05:29:39Z","timestamp":1722662979000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10613705\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,19]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/jcsse61278.2024.10613705","relation":{},"subject":[],"published":{"date-parts":[[2024,6,19]]}}}