{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:41Z","timestamp":1750306481497,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,28]],"date-time":"2015-09-28T00:00:00Z","timestamp":1443398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,28]]},"DOI":"10.1145\/2815782.2815812","type":"proceedings-article","created":{"date-parts":[[2015,12,18]],"date-time":"2015-12-18T14:32:43Z","timestamp":1450449163000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["SpotMal"],"prefix":"10.1145","author":[{"given":"Munyaradzi","family":"Gudo","sequence":"first","affiliation":[{"name":"Botho University, Botswana"}]},{"given":"Keshnee","family":"Padayachee","sequence":"additional","affiliation":[{"name":"University of South Africa, South Africa"}]}],"member":"320","published-online":{"date-parts":[[2015,9,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/BioMedCom.2012.26"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2012.79"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-12-2012-0068"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.02.002"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"V. M. Afonso D. S. F. Filho A. Gregio P. L. de Geus and M. Jino \"A hybrid framework to analyze web and OS malware \" in 2012 IEEE International Conference on Communications (ICC) 2012 pp. 966--970. V. M. Afonso D. S. F. Filho A. Gregio P. L. de Geus and M. Jino \"A hybrid framework to analyze web and OS malware \" in 2012 IEEE International Conference on Communications (ICC) 2012 pp. 966--970.","DOI":"10.1109\/ICC.2012.6364108"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"H.-S. Chiang and W. Tsaur \"Identifying Smartphone Malware Using Data Mining Technology \" in 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN) 2011 pp. 1--6. H.-S. Chiang and W. Tsaur \"Identifying Smartphone Malware Using Data Mining Technology \" in 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN) 2011 pp. 1--6.","DOI":"10.1109\/ICCCN.2011.6005937"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.08.020"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2013.19"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICHIS.2004.75"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.37"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Q. Jiang X. Zhao and K. Huang \"A feature selection method for malware detection \" in 2011 IEEE International Conference on Information and Automation (ICIA) 2011 pp. 890--895. Q. Jiang X. Zhao and K. Huang \"A feature selection method for malware detection \" in 2011 IEEE International Conference on Information and Automation (ICIA) 2011 pp. 890--895.","DOI":"10.1109\/ICINFA.2011.5949122"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2012.34"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.101613.00077"},{"volume-title":"USA Congr. Comm., no. GAO-12--757","year":"2012","author":"Government Accountability","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","unstructured":"Ponemon Institute \"2012 Cost of Cyber Crime Study: United States \" Ponemon Institute LLC Cost of Data breach Report Oct. 2012. Ponemon Institute \"2012 Cost of Cyber Crime Study: United States \" Ponemon Institute LLC Cost of Data breach Report Oct. 2012."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(13)70092-8"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1108\/10662240910952346"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2013.48"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"P. Wang \"Survey on Privacy Preserving Data Mining \" in International Journal of Digital Content Technology and its Applications 2010 vol. 4. P. Wang \"Survey on Privacy Preserving Data Mining \" in International Journal of Digital Content Technology and its Applications 2010 vol. 4.","DOI":"10.4156\/jdcta.vol4.issue9.1"}],"event":{"name":"SAICSIT '15: The 2015 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists","acronym":"SAICSIT '15","location":"Stellenbosch South Africa"},"container-title":["Proceedings of the 2015 Annual Research Conference on South African Institute of Computer Scientists and Information Technologists"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815782.2815812","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2815782.2815812","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:22Z","timestamp":1750225702000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815782.2815812"}},"subtitle":["A hybrid malware detection framework with privacy protection for BYOD"],"short-title":[],"issued":{"date-parts":[[2015,9,28]]},"references-count":19,"alternative-id":["10.1145\/2815782.2815812","10.1145\/2815782"],"URL":"https:\/\/doi.org\/10.1145\/2815782.2815812","relation":{},"subject":[],"published":{"date-parts":[[2015,9,28]]},"assertion":[{"value":"2015-09-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}