{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:19:46Z","timestamp":1775067586907,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/sds.2019.8768729","type":"proceedings-article","created":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T19:53:52Z","timestamp":1564084432000},"page":"110-117","source":"Crossref","is-referenced-by-count":44,"title":["A Survey on Android Malware Detection Techniques Using Machine Learning Algorithms"],"prefix":"10.1109","author":[{"given":"Ebtesam J.","family":"Alqahtani","sequence":"first","affiliation":[{"name":"Department of Computer Science, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia"}]},{"given":"Rachid","family":"Zagrouba","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia"}]},{"given":"Abdullah","family":"Almuhaideb","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/NGMAST.2014.23"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924286"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SERA.2016.7516130"},{"key":"ref13","first-page":"735","article-title":"Malware detection using machine learning","author":"gavrilu","year":"2009","journal-title":"Comput Sci Inf Technol 2009 IMCSIT&#x2019;09 Int Multiconference"},{"key":"ref14","first-page":"7","author":"chen","year":"2018","journal-title":"Deep Learning for Malicious Flow Detection"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.5121\/ijdps.2014.5403"},{"key":"ref16","year":"2018","journal-title":"Next-generation Nokia security software taps automation and analytics to help service providers combat growing ransomware threat | Nokia"},{"key":"ref17","author":"luna","year":"2018","journal-title":"Nokia Android the prime target for malware in 2017"},{"key":"ref18","first-page":"21","article-title":"A Study of Android Application Security","volume":"39","author":"enck","year":"2011","journal-title":"Usenix Security"},{"key":"ref19","year":"2012","journal-title":"Android Malware - How to Prevent It"},{"key":"ref4","volume":"3","author":"balaganesh","year":"2018","journal-title":"Smart Devices Threats Vulnerabilities and Malware Detection Approaches A Survey"},{"key":"ref3","author":"anderson","year":"2017","journal-title":"Evading machine learning malware detection"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-017-0059-2"},{"key":"ref5","first-page":"21378","article-title":"Behavioural Analysis of Android Malware using Machine Learning","volume":"6","author":"vaishanav","year":"2017","journal-title":"International Journal of Computational Engineering Science"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCS.2014.7068167"},{"key":"ref7","first-page":"20136","volume":"20136","author":"wen","year":"2017","journal-title":"An Android malware detection system based on machine learning"},{"key":"ref2","author":"egham","year":"2012","journal-title":"Gartner Says Worldwide Smartphone Sales Soared in Fourth Quarter of 2011 with 47 Percent Growth"},{"key":"ref1","author":"egham","year":"2018","journal-title":"Gartner Says Worldwide Sales of Smartphones Recorded First Ever Decline During the Fourth Quarter of 2017"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2012.34"},{"key":"ref20","author":"khandelwal","year":"2017","journal-title":"Yet Another Android Malware Infects Over 4 2 Million Google Play Store Users"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref21","year":"0","journal-title":"AdultSwine Malware Alert Google pulls down 60 nefarious apps that steal user credentials on Android phones"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"2019 Sixth International Conference on Software Defined Systems (SDS)","location":"Rome, Italy","start":{"date-parts":[[2019,6,10]]},"end":{"date-parts":[[2019,6,13]]}},"container-title":["2019 Sixth International Conference on Software Defined Systems (SDS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8764267\/8768486\/08768729.pdf?arnumber=8768729","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T11:28:08Z","timestamp":1670239688000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8768729\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/sds.2019.8768729","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}