{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:29:12Z","timestamp":1747805352995,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/uemcon.2016.7777867","type":"proceedings-article","created":{"date-parts":[[2016,12,13]],"date-time":"2016-12-13T01:35:39Z","timestamp":1481592939000},"page":"1-7","source":"Crossref","is-referenced-by-count":7,"title":["AntiWare: An automated Android malware detection tool based on machine learning approach and official market metadata"],"prefix":"10.1109","author":[{"given":"Nuray Baltaci","family":"Akhuseyinoglu","sequence":"first","affiliation":[]},{"given":"Kamil","family":"Akhuseyinoglu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"1","article-title":"Data Mining and Knowledge Discovery","author":"cios","year":"2007","journal-title":"Data Mining Methods for Knowledge Discovery"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"article-title":"Google Play Crawler","year":"2014","author":"demiroz","key":"ref31"},{"key":"ref30","first-page":"1","article-title":"An automated malware detection system for android using behavior-based analysis AMDA","volume":"2","author":"abela","year":"2013","journal-title":"International Journal of Cyber-security and Digital Forensics"},{"key":"ref34","first-page":"47","article-title":"Discretization techniques: A recent survey","volume":"32","author":"kotsiantis","year":"2006","journal-title":"GESTS International Transactions on Computer Science and Engineering"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2013.170"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33392-7_1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/479174"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2523912"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"journal-title":"Securing the Mobile App Market How Code Signing Can Bolster Security for Mobile Applications","year":"2012","key":"ref16"},{"year":"0","key":"ref17","article-title":"Android Developer Website"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38530-8_4"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.07.106"},{"year":"0","key":"ref28","article-title":"VirusTotal"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2013.111"},{"article-title":"Android Application Dataset for Malware Detection","year":"0","author":"baltaci","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.013012.00028"},{"key":"ref6","first-page":"4","article-title":"A window into mobile device security","author":"nachenberg","year":"2011","journal-title":"Symantec Security Response"},{"article-title":"Evaluating and Comparing the Performance of Machine Learning Algortihms","year":"2010","author":"mitchell","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2592791.2592796"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"ref7","article-title":"Android market analysis with activation patterns","author":"teufl","year":"2011","journal-title":"International Conference on Security and Privacy in Mobile Information and Communication Systems"},{"journal-title":"Mobile Security Guide Protect Your Organization from Mobile Malware","year":"2013","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2013.53"},{"journal-title":"Mobile Malware Report 2014","article-title":"Blue Coat Systems","year":"2014","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378626"},{"key":"ref22","article-title":"Estimating continuous distributions in Bayesian classifiers","author":"john","year":"1995","journal-title":"Proceedings of the Eleventh Conference on Uncertainty in Artificial Intelligence"},{"key":"ref21","article-title":"Android security permissions-can we trust them?","author":"orthacker","year":"2011","journal-title":"International Conference on Security and Privacy in Mobile Information and Communication Systems"},{"journal-title":"Data Mining for Business Analytics Concepts Techniques and Applications in XLMiner","year":"2016","author":"shmueli","key":"ref24"},{"journal-title":"Data Mining Practical Machine Learning Tools and Techniques","year":"2005","author":"witten","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0148-x"},{"key":"ref25","article-title":"Feature selection for high-dimensional data: A fast correlation-based filter solution","author":"yu","year":"2003","journal-title":"Proceedings of ICML"}],"event":{"name":"2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","start":{"date-parts":[[2016,10,20]]},"location":"New York City, NY, USA","end":{"date-parts":[[2016,10,22]]}},"container-title":["2016 IEEE 7th Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7763653\/7777798\/07777867.pdf?arnumber=7777867","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T04:10:34Z","timestamp":1507003834000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7777867\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/uemcon.2016.7777867","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}