{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T11:15:50Z","timestamp":1730286950539,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,13]],"date-time":"2023-12-13T00:00:00Z","timestamp":1702425600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,13]],"date-time":"2023-12-13T00:00:00Z","timestamp":1702425600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,13]]},"DOI":"10.1109\/ocit59427.2023.10431229","type":"proceedings-article","created":{"date-parts":[[2024,2,19]],"date-time":"2024-02-19T19:52:25Z","timestamp":1708372345000},"page":"11-16","source":"Crossref","is-referenced-by-count":0,"title":["Android Malware Detection And Family Classification using Permission Features With Intrusion Awareness"],"prefix":"10.1109","author":[{"given":"Praful R.","family":"Pardhi","sequence":"first","affiliation":[{"name":"KIIT Deemed to be University,School of Computer Engineering,Bhubaneswar,India"}]},{"given":"Jitendra","family":"Kumar Rout","sequence":"additional","affiliation":[{"name":"National Institute of Technology,Department of Computer Science &#x0026; Engineering,Raipur,India"}]},{"given":"Vanshika V.","family":"Bais","sequence":"additional","affiliation":[{"name":"Shri Ramdeobaba College of Engineering &#x0026; Management,Department of Computer Science &#x0026; Engineering,Nagpur,India"}]},{"given":"Kapil V.","family":"Pawar","sequence":"additional","affiliation":[{"name":"Shri Ramdeobaba College of Engineering &#x0026; Management,Department of Computer Science &#x0026; Engineering,Nagpur,India"}]},{"given":"Mamta R.","family":"Yadav","sequence":"additional","affiliation":[{"name":"Shri Ramdeobaba College of Engineering &#x0026; Management,Department of Computer Science &#x0026; Engineering,Nagpur,India"}]},{"given":"Harsh C.","family":"Gade","sequence":"additional","affiliation":[{"name":"Shri Ramdeobaba College of Engineering &#x0026; Management,Department of Computer Science &#x0026; Engineering,Nagpur,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSA45270.2018.00024"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/app8091622"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICASI.2018.8394488"},{"volume-title":"A Benchmark API Call Dataset For Windows PE Malware Classification","year":"2021","author":"Catak","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2021.1889977"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/s22207928"},{"issue":"1","key":"ref7","first-page":"5","article-title":"Android Malware Prevention on Permission Based","volume":"15","author":"Shehata","year":"2020","journal-title":"49 International Journal of Applied Engineering Research","ISSN":"http:\/\/id.crossref.org\/issn\/0973-4562","issn-type":"print"},{"issue":"02","key":"ref8","article-title":"Classification Of Malware Detection Using Machine Learning Algorithms: A Survey","volume":"9","author":"HarshaLatha","year":"2020","journal-title":"International Journal Of Scientific & Technology Research"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2012.4106"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102526"},{"volume-title":"Reference Dataset from AndroZoo","key":"ref11"},{"volume-title":"VirusTotal","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883666"},{"issue":"3","key":"ref14","article-title":"Permission-Based Android Malware Detection","volume":"2","author":"Aung","year":"2013","journal-title":"International Journal of Scientific & Technology Research"},{"key":"ref15","article-title":"Android Malware Detection System Based on Ensemble Learning","author":"AbuAlghanama","year":"2023","journal-title":"Preprint submitted to The Journal of Supercomputing"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/OCIT53463.2021.00015"},{"volume-title":"dataset","key":"ref17"}],"event":{"name":"2023 OITS International Conference on Information Technology (OCIT)","start":{"date-parts":[[2023,12,13]]},"location":"Raipur, India","end":{"date-parts":[[2023,12,15]]}},"container-title":["2023 OITS International Conference on Information Technology (OCIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10430418\/10430505\/10431229.pdf?arnumber=10431229","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T01:30:59Z","timestamp":1709861459000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10431229\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,13]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ocit59427.2023.10431229","relation":{},"subject":[],"published":{"date-parts":[[2023,12,13]]}}}