{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:56:20Z","timestamp":1729626980072,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/wcnc.2014.6952790","type":"proceedings-article","created":{"date-parts":[[2014,11,26]],"date-time":"2014-11-26T14:59:19Z","timestamp":1417013959000},"page":"2552-2557","source":"Crossref","is-referenced-by-count":5,"title":["Robust clustering methods for detecting smartphone's abnormal behavior"],"prefix":"10.1109","author":[{"given":"Ali El","family":"Attar","sequence":"first","affiliation":[]},{"given":"Rida","family":"Khatoun","sequence":"additional","affiliation":[]},{"given":"Babiga","family":"Birregah","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Lemercier","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.03.046"},{"key":"17","first-page":"1","article-title":"Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones","author":"enck","year":"2010","journal-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation OSDI'10"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920313"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1080\/0094965031000136012"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2004.1378409"},{"key":"16","article-title":"Enhancing security of linux-based android devices","author":"schmidt","year":"2008","journal-title":"15th International Linux Kongress"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.319"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378627"},{"year":"2004","author":"malware variants","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2009.5403024"},{"key":"20","first-page":"1","article-title":"Andromaly: A behavioral malware detection framework for android devices","author":"elovici chanan glezer asaf shabtai","year":"2011","journal-title":"Journal of Intelligent Information Systems"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2010.5665792"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"journal-title":"Outlier Detection - A survey","year":"2007","author":"ch","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(03)00003-5"},{"journal-title":"Pattern Recognition and Machine Learning (Information Science and Statistics) Springer","year":"2006","author":"christopher","key":"26"},{"key":"27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","article-title":"Maximum likelihood from incomplete data via the em algorithm","volume":"39","author":"dempster","year":"1977","journal-title":"Journal of the Royal Statistical Society Series B"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008981510081"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1214\/07-AOS515"},{"key":"3","first-page":"8","article-title":"Scalable, behavior-based malware clustering","volume":"9","author":"bayer","year":"2009","journal-title":"NDSS"},{"journal-title":"Mobile threat report q1 2012 Technical report","year":"2012","author":"labs","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2004.21"},{"journal-title":"Android Opfake in-depth Technical report Symantec Corporation","year":"2012","author":"suenaga","key":"1"},{"key":"30","first-page":"553576","article-title":"Trimmed k-means: An attempt to robustify quantizers","volume":"25","author":"gordaliza j a cuesta-albertos","year":"1997","journal-title":"Ann Statist"},{"key":"7","article-title":"Behavioral classification","author":"lee","year":"2006","journal-title":"Proceedings of EICAR 2006"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287628"},{"key":"32","first-page":"3","article-title":"Data clustering: 50 years beyond k-means","author":"anil","year":"2008","journal-title":"Machine Learning and Knowledge Discovery in Databases European Conference ECML\/PKDD 2008"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2009.03.003"},{"key":"31","first-page":"253","article-title":"Tclust: Trimming approach of robust clustering method","volume":"8","author":"jedi","year":"2012","journal-title":"Malaysian Journal of Fundamental & Applied Sciences"},{"key":"4","first-page":"12","article-title":"Static analysis of executables to detect malicious patterns","author":"christodorescu","year":"2003","journal-title":"Proceedings of the 12th Conference on USENIX Security Symposium-12 SSYM'03"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.21"},{"key":"8","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1007\/978-3-540-70542-0_6","article-title":"Learning and classification of malware behavior","author":"rieck","year":"2008","journal-title":"Proceedings of the 5th International Conference on Detection of Intrusions and Malware and Vulnerability Assessment DIMVA '08"}],"event":{"name":"2014 IEEE Wireless Communications and Networking Conference (WCNC)","start":{"date-parts":[[2014,4,6]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2014,4,9]]}},"container-title":["2014 IEEE Wireless Communications and Networking Conference (WCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6923023\/6951847\/06952790.pdf?arnumber=6952790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,5]],"date-time":"2024-06-05T10:15:42Z","timestamp":1717582542000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6952790\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/wcnc.2014.6952790","relation":{},"subject":[],"published":{"date-parts":[[2014,4]]}}}