{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T06:49:51Z","timestamp":1773470991303,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/ssic.2018.8556755","type":"proceedings-article","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T20:08:55Z","timestamp":1544126935000},"page":"1-5","source":"Crossref","is-referenced-by-count":8,"title":["A Novel Android Malware Detection Approach Using Operand Sequences"],"prefix":"10.1109","author":[{"given":"Peng","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Shaoyin","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Songhao","family":"Lou","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.25"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2663761.2664223"},{"key":"ref13","article-title":"DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis","author":"kwong yan","year":"2012","journal-title":"21th USENIX Security Symposium"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.08.020"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2017.8323963"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"938","DOI":"10.1093\/jigpal\/jzx031","article-title":"Using Dalvik opcodes for malware detection on android","volume":"25","author":"gaviria de la puerta","year":"2017","journal-title":"Logic Journal of the IGPL"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2513228.2513295"},{"key":"ref19","year":"0"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2017.23353","article-title":"MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models","author":"mariconti","year":"2017","journal-title":"24th Annual Network and Distributed System Security Symposium"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.5220\/0005537800270038","article-title":"Mobile Malware Detection using Op-code Frequency Histograms","author":"canfora","year":"2015","journal-title":"Proceedings of International Conference on Security and Cryptography"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098026"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.57"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883436"},{"key":"ref2","year":"0","journal-title":"G DATA Security Blog"},{"key":"ref1","year":"0","journal-title":"Operating Systems Market Share"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2016.0155"},{"key":"ref20","year":"0"},{"key":"ref22","year":"0"},{"key":"ref21","year":"0"}],"event":{"name":"2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","location":"Shanghai, China","start":{"date-parts":[[2018,10,18]]},"end":{"date-parts":[[2018,10,19]]}},"container-title":["2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8537784\/8556633\/08556755.pdf?arnumber=8556755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T22:13:48Z","timestamp":1643235228000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8556755\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/ssic.2018.8556755","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}