{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T17:46:48Z","timestamp":1776880008473,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T00:00:00Z","timestamp":1508803200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["5-244780"],"award-info":[{"award-number":["5-244780"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Maryland Procurement Office","award":["H98230-14-C-0127"],"award-info":[{"award-number":["H98230-14-C-0127"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978304","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T08:46:35Z","timestamp":1477385195000},"page":"767-778","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":74,"title":["FeatureSmith"],"prefix":"10.1145","author":[{"given":"Ziyun","family":"Zhu","sequence":"first","affiliation":[{"name":"University of Maryland, College Park, College Park, MD, USA"}]},{"given":"Tudor","family":"Dumitra\u015f","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, College Park, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Android developer documents. http:\/\/developer.android.com\/index.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Android malware family list. http:\/\/forensics.spreitzenbarth.de\/android-malware\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Common attack pattern enumeration and classification (CAPEC). https:\/\/capec.mitre.org."},{"key":"e_1_3_2_1_4_1","unstructured":"Malware attribute enumeration and characterization MAEC. https:\/\/maec.mitre.org\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Virus total. www.virustotal.com."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2012.143"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.50"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2012.2188154"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.82.6.407"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638293"},{"key":"e_1_3_2_1_14_1","unstructured":"DARPA. DARPA goes \"Meta\" with machine learning for machine learning. http:\/\/www.darpa.mil\/news-events\/2016-06--17 2016."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2701413"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1608858.1608859"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.11.001"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278940.1278945"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199806)49:8<674::AID-ASI2>3.0.CO;2-T"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2027999.2028001"},{"key":"e_1_3_2_1_22_1","unstructured":"Kaspersky Lab. First SMS Trojan detected for smartphones running Android. http:\/\/www.kaspersky.com\/about\/news\/virus\/2010\/First_SMS_Trojan_detected_for_smartphones_running_Android Aug 2010."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.2307\/2332226"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-010-0202-z"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978315"},{"issue":"3","key":"e_1_3_2_1_26_1","first-page":"18","article-title":"Classification and regression by randomforest","volume":"2","author":"Liaw A.","year":"2002","unstructured":"A. Liaw and M. Wiener. Classification and regression by randomforest. R news, 2(3):18--22, 2002.","journal-title":"R news"},{"key":"e_1_3_2_1_27_1","unstructured":"MANDIANT. The OpenIOC framework. http:\/\/www.openioc.org\/."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1394399"},{"key":"e_1_3_2_1_29_1","volume-title":"Jul","author":"McKinsey Global Institute","year":"2013","unstructured":"McKinsey Global Institute. Game changers: Five opportunities for US growth and renewal, Jul 2013."},{"key":"e_1_3_2_1_30_1","volume-title":"Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781","author":"Mikolov T.","year":"2013","unstructured":"T. Mikolov, K. Chen, G. Corrado, and J. Dean. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781, 2013."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219748"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2010.53"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2015.7363837"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/2534766.2534812"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382224"},{"key":"e_1_3_2_1_36_1","volume-title":"Ontologies in medicine","author":"Pisanelli D. M.","year":"2004","unstructured":"D. M. Pisanelli. Ontologies in medicine, volume 102. IOS Press, 2004."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23039"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818038"},{"key":"e_1_3_2_1_40_1","volume-title":"Droidtrack: Tracking and visualizing information diffusion for preventing information leakage on android. Journal of Internet Services and Information Security (JISIS), 4(2):55--69","author":"Sakamoto S.","year":"2014","unstructured":"S. Sakamoto, K. Okuda, R. Nakatsuka, and T. Yamauchi. Droidtrack: Tracking and visualizing information diffusion for preventing information leakage on android. Journal of Internet Services and Information Security (JISIS), 4(2):55--69, 2014."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623667"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480701"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1021954808804"},{"key":"e_1_3_2_1_45_1","volume-title":"Fish oil, raynaud's syndrome, and undiscovered public knowledge. Perspectives in biology and medicine, 30(1):7--18","author":"Swanson D. R.","year":"1986","unstructured":"D. R. Swanson. Fish oil, raynaud's syndrome, and undiscovered public knowledge. Perspectives in biology and medicine, 30(1):7--18, 1986."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00008-8"},{"key":"e_1_3_2_1_47_1","volume-title":"Symantec Internet security threat report","author":"Symantec Corporation","year":"2015","unstructured":"Symantec Corporation. Symantec Internet security threat report, volume 20, April 2015."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/2228340.2228359"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/781995.782008"},{"key":"e_1_3_2_1_50_1","volume-title":"NDSS","author":"Wang D. Y.","year":"2013","unstructured":"D. Y. Wang, S. Savage, and G. M. Voelker. Juice: A longitudinal study of an seo botnet. In NDSS, 2013."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660359"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.61"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"e_1_3_2_1_54_1","volume-title":"NDSS","author":"Zhou Y.","year":"2012","unstructured":"Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In NDSS, 2012."}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978304","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978304","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:25:50Z","timestamp":1763457950000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978304"}},"subtitle":["Automatically Engineering Features for Malware Detection by Mining the Security Literature"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":54,"alternative-id":["10.1145\/2976749.2978304","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978304","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}