{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T11:18:17Z","timestamp":1762341497872,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1109\/rivf48685.2020.9140771","type":"proceedings-article","created":{"date-parts":[[2020,7,15]],"date-time":"2020-07-15T21:32:06Z","timestamp":1594848726000},"page":"1-6","source":"Crossref","is-referenced-by-count":8,"title":["A Machine Learning Approach for Real Time Android Malware Detection"],"prefix":"10.1109","author":[{"given":"Ngoc C.","family":"Le","sequence":"first","affiliation":[]},{"given":"Tien-Manh","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Trang","family":"Truong","sequence":"additional","affiliation":[]},{"given":"Ngoc-Dam","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Tra","family":"Ngo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2015","key":"ref31","article-title":"The Koodous Website"},{"year":"2012","key":"ref30","article-title":"The Virusshare Website"},{"key":"ref10","first-page":"278","article-title":"Random Decision Forests","author":"ho","year":"1416","journal-title":"Proceedings of the 3rd International Conference on Document Analysis and Recognition"},{"key":"ref11","first-page":"223","article-title":"An analysis of bayesian classifiers","author":"langley","year":"1992","journal-title":"Proceedings of the National Conference on Artificial Intelligence"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DSC.2017.13"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23353"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2018.12.006"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CBD.2016.046"},{"article-title":"emlearn: Machine Learning inference engine for Micro-controllers and Embedded Devices","year":"2019","author":"nordby","key":"ref16"},{"key":"ref17","first-page":"182","article-title":"Malicious Behavior Analysis for Android Applications","volume":"18","author":"qian","year":"2016","journal-title":"International Journal of Network Security"},{"article-title":"C4.5: programs for machine learning","year":"1993","author":"quinlan","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.11.028"},{"year":"2017","key":"ref28","article-title":"Symantec Blog - Threat-Intelligence"},{"key":"ref4","article-title":"Ensemble methods in machine learning","author":"dietterich","year":"2000","journal-title":"Multiple Classifier Systems First International Workshop MCS 2000"},{"year":"2010","key":"ref27","article-title":"The Hacker News Website"},{"article-title":"Arcing The Edge","year":"1997","author":"breiman","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1013203451"},{"year":"2013","key":"ref29","article-title":"The Welivesecurity Website"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2523514.2523539"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0110"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9473(01)00065-2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44966-0_23"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101663"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.190"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21373-2_10"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-019-00332-z"},{"year":"2019","key":"ref24","article-title":"McAfee Mobile Threat Report Q1 2019"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2013.25"},{"article-title":"Lukas Stefanko&#x2019;s Twitter","year":"2014","author":"stefanko","key":"ref26"},{"year":"2009","key":"ref25","article-title":"Android Developer Document - Manifest Permissins"}],"event":{"name":"2020 RIVF International Conference on Computing and Communication Technologies (RIVF)","start":{"date-parts":[[2020,10,14]]},"location":"Ho Chi Minh, Vietnam","end":{"date-parts":[[2020,10,15]]}},"container-title":["2020 RIVF International Conference on Computing and Communication Technologies (RIVF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9138608\/9140725\/09140771.pdf?arnumber=9140771","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:51:17Z","timestamp":1656453077000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9140771\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/rivf48685.2020.9140771","relation":{},"subject":[],"published":{"date-parts":[[2020,10]]}}}