{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:40:56Z","timestamp":1729647656896,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/pst.2016.7907009","type":"proceedings-article","created":{"date-parts":[[2017,4,24]],"date-time":"2017-04-24T21:12:50Z","timestamp":1493068370000},"page":"512-519","source":"Crossref","is-referenced-by-count":4,"title":["A constraint-driven approach for dynamic malware detection"],"prefix":"10.1109","author":[{"given":"Mario Luca","family":"Bernardi","sequence":"first","affiliation":[]},{"given":"Marta","family":"Cimitile","sequence":"additional","affiliation":[]},{"given":"Damiano","family":"Distante","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Mercaldo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"357","article-title":"Weka: A machine learning workbench","author":"geoffrey","year":"1994","journal-title":"Proceedings of the 1994 Second Australian and New Zealand Conference on Intelligent Information Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2011.226"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2559915"},{"journal-title":"Android Malware","year":"2013","author":"xuxian","key":"ref13"},{"journal-title":"Mobile Threat Report","year":"2016","key":"ref14"},{"key":"ref15","article-title":"Dissecting the android bouncer","author":"oberheide","year":"0","journal-title":"SummerCon 2012"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2007.14"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484355"},{"key":"ref18","article-title":"A System Call-Centric Analysis and Stimulation Technique to Automatically Reconstruct Android Malware Behaviors","author":"reina","year":"2013","journal-title":"Proc of EUROSEC"},{"key":"ref19","article-title":"Enhancing security of linux-based android devices","author":"schmidt","year":"2008","journal-title":"15th International Linux Kongress"},{"key":"ref4","first-page":"97","author":"chandra bose","year":"2013","journal-title":"Business Process Management-11th International Conference BPM 2013"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/EDOCW.2012.17"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.80"},{"key":"ref5","first-page":"833","article-title":"Online Discovery of Declarative Process Models from Event Streams","volume":"6","author":"andrea","year":"2015","journal-title":"IEEE T Services Computing"},{"key":"ref8","first-page":"444","article-title":"The Prom Framework: A New Era in Process Mining Tool Support","author":"van dongen","year":"2005","journal-title":"Proceedings of the 26th International Conference on Applications and Theory of Petri Nets ICATPN'05"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/2804345.2804349","article-title":"Detecting Android Malware Using Sequences of System Calls","author":"canfora","year":"2015","journal-title":"Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile"},{"key":"ref2","article-title":"Drebin: Efficient and Explainable Detection of Android Malware in Your Pocket","author":"daniel","year":"2014","journal-title":"Proceedings of 21th Annual Network and Distributed System Security Symposium (NDSS)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635869"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/NGMAST.2014.57"},{"key":"ref20","article-title":"System Calls Analysis of Malwares on Android","volume":"2","author":"tchakount\u00e9","year":"2013","journal-title":"International Journal of Science and Tecnology (IJST)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.91"},{"year":"2016","key":"ref21"},{"key":"ref24","first-page":"163","article-title":"Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware","author":"min","year":"2013","journal-title":"Proceedings of the 12th IEEE International Conference on Trust Security and Privacy in Computing and Communications"},{"key":"ref23","first-page":"29","article-title":"DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis","author":"kwong yan","year":"2012","journal-title":"Proceedings of the 21st USENIX Conference on Security Symposium"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"}],"event":{"name":"2016 14th Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2016,12,12]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2016,12,14]]}},"container-title":["2016 14th Annual Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7899233\/7906913\/07907009.pdf?arnumber=7907009","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T21:15:29Z","timestamp":1658956529000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7907009\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/pst.2016.7907009","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}