{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T15:12:35Z","timestamp":1772896355680,"version":"3.50.1"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/N508664\/1"],"award-info":[{"award-number":["EP\/N508664\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cybern."],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1109\/tcyb.2017.2777960","type":"journal-article","created":{"date-parts":[[2018,1,4]],"date-time":"2018-01-04T22:54:38Z","timestamp":1515106478000},"page":"453-466","source":"Crossref","is-referenced-by-count":171,"title":["DroidFusion: A Novel Multilevel Classifier Fusion Approach for Android Malware Detection"],"prefix":"10.1109","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0346-1219","authenticated-orcid":false,"given":"Suleiman Y.","family":"Yerima","sequence":"first","affiliation":[]},{"given":"Sakir","family":"Sezer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref38","first-page":"41","author":"cover","year":"2006","journal-title":"Elements of Information Theory"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/LATINCOM.2016.7811605"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2008.35"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ARTCom.2009.121"},{"key":"ref30","first-page":"62","article-title":"Ensembles of decision trees for network intrusion detection systems","volume":"6","author":"balon-perlin","year":"2013","journal-title":"International Journal on Advances in Security"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"ref36","article-title":"Longitudinal analysis of Android ad library permissions","author":"book","year":"2013","journal-title":"Proc Mobile Secur Technol (MoST)"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2017.8074845"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.103"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3041008.3041010"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30933-0_20"},{"key":"ref2","year":"2016","journal-title":"McAfee Labs Threat Predictions Report"},{"key":"ref1","year":"2017","journal-title":"Smartphone OS market share worldwide 2009-2015 - Statistic Statista"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2355839"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2014.6962194"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEI.2015.7352513"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/978-3-642-27503-6_22","article-title":"AntiMalDroid: An efficient SVM-based malware detection framework for Android","volume":"243","author":"zhao","year":"2011","journal-title":"Communications in Computer and Information Science"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.22619\/IJCSA.2016.1001011"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-014-0226-7"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2663761.2664223"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.02.013"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.01.019"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.03.011"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4172"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3021460.3021485"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.04.041"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.89"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"ref40","first-page":"148","article-title":"Experiments with a new boosting algorithm","author":"freund","year":"1996","journal-title":"Proc 13th Int Conf Mach Learn"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SAI.2015.7237302"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/NGMAST.2014.23"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2014.0099"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-016-0277-z"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/978-3-319-12280-9_13","article-title":"Mining API calls and permissions for Android malware detection","author":"sharma","year":"2014","journal-title":"Cryptology and Network Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2014.7009096"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2353996"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2687880"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664250"},{"key":"ref5","author":"apvrille","year":"2014","journal-title":"Obfuscation in Android Malware and How to Fight Back Virus Bulletin"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2592791.2592796"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590325"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2017.7993923"},{"key":"ref9","author":"matenaar","year":"2012","journal-title":"Detecting Android Sandboxes"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CBD.2016.046"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2016.29"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.03.004"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SARNOF.2016.7846747"},{"key":"ref42","first-page":"278","article-title":"Random decision forests","author":"ho","year":"1995","journal-title":"Proc 3rd Int Conf Document Anal Recognition"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"832","DOI":"10.1109\/34.709601","article-title":"The random subspace method for constructing decision forests","volume":"20","author":"ho","year":"1998","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1613\/jair.594"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(05)80023-1"}],"container-title":["IEEE Transactions on Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221036\/8612980\/08245867.pdf?arnumber=8245867","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:07:00Z","timestamp":1657746420000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8245867\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":55,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tcyb.2017.2777960","relation":{},"ISSN":["2168-2267","2168-2275"],"issn-type":[{"value":"2168-2267","type":"print"},{"value":"2168-2275","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2]]}}}