{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:01:05Z","timestamp":1729616465740,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/siu.2015.7130365","type":"proceedings-article","created":{"date-parts":[[2015,6,24]],"date-time":"2015-06-24T11:49:31Z","timestamp":1435146571000},"page":"2400-2403","source":"Crossref","is-referenced-by-count":3,"title":["API call and permission based mobile malware detection (in english)"],"prefix":"10.1109","author":[{"given":"Ahmet Ilhan","family":"Aysan","sequence":"first","affiliation":[]},{"given":"Sevil","family":"Sen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref11","article-title":"Analysis of mobile p2p malware deteetion framework through cabir & commwarrior families","author":"adeel muhammad","year":"2011","journal-title":"Proc of 2011 IEEE third international conference on social computing IEEE"},{"key":"ref12","first-page":"5","article-title":"Hey, you, get out of my market: Detecting malicious apps in official and alternative android markets","author":"zhou","year":"2012","journal-title":"Proc 19th Annu Netw Distrib Syst Security Symp"},{"key":"ref13","article-title":"A behavior analysis based Mobile Mahvare Defense System","author":"guo","year":"2012","journal-title":"Proc of the 6th International Conference on Signal Processing and Communication Systems (ICSPCS) IEEE"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1145\/1999995.2000018","article-title":"Analyzing interapplication communication in Android","author":"chin","year":"2011","journal-title":"Proc 9th Int Conf on Mobile Systems Applications and Services"},{"key":"ref15","article-title":"DroidMat: Android Mahvare Deteetion through Manifest and API Calls Tracing","author":"wu","year":"2012","journal-title":"Information Security (Asia JCIS)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516689"},{"key":"ref18","first-page":"219","volume":"55","author":"gama","year":"2004","journal-title":"Functional trees Machine Leaming"},{"key":"ref19","first-page":"81","volume":"1","author":"quinlan","year":"1986","journal-title":"Induction of Decision Tree Machine Learning"},{"journal-title":"Android Market API","year":"2014","key":"ref4"},{"journal-title":"Google Play","year":"2014","key":"ref3"},{"key":"ref6","volume":"11","author":"mark","year":"2009","journal-title":"The WEKA Data Mining Software An Update SIGKDD Explorations"},{"key":"ref5","first-page":"86","article-title":"DroidAPIMiner: Mining API-level features for robust mahvare deteetion in android","author":"yousra","year":"2013","journal-title":"Security and Privacy in Communication Networks"},{"journal-title":"F-secure","year":"2014","key":"ref8"},{"journal-title":"Gartner","year":"2014","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"journal-title":"Android-apktool","year":"2014","key":"ref1"},{"journal-title":"Mobile threats","year":"2015","key":"ref9"},{"key":"ref20","volume":"6","author":"aha","year":"1991","journal-title":"Instance-Based Learning Algorithms Machine Learning"}],"event":{"name":"2015 23th Signal Processing and Communications Applications Conference (SIU)","start":{"date-parts":[[2015,5,16]]},"location":"Malatya, Turkey","end":{"date-parts":[[2015,5,19]]}},"container-title":["2015 23nd Signal Processing and Communications Applications Conference (SIU)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7116933\/7129794\/07130365.pdf?arnumber=7130365","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T13:30:49Z","timestamp":1566912649000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7130365\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/siu.2015.7130365","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}