{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:07:13Z","timestamp":1750306033675,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,8]],"date-time":"2017-12-08T00:00:00Z","timestamp":1512691200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,8]]},"DOI":"10.1145\/3171592.3171636","type":"proceedings-article","created":{"date-parts":[[2018,3,16]],"date-time":"2018-03-16T12:53:36Z","timestamp":1521204816000},"page":"106-109","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["PFESG"],"prefix":"10.1145","author":[{"given":"Chengcheng","family":"Wang","sequence":"first","affiliation":[{"name":"Beihang University, Beijing"}]},{"given":"Yuqing","family":"Lan","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing"}]}],"member":"320","published-online":{"date-parts":[[2017,12,8]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.5555\/2028067.2028088"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/2046614.2046618"},{"key":"e_1_3_2_1_3_1","volume-title":"2017 Internet Security Threat Report","author":"Symantec","year":"2017","unstructured":"Symantec , 2017 Internet Security Threat Report , Vol. 22 , 2017 , https:\/\/www.symantec.com\/security-center\/threat-report Symantec, 2017 Internet Security Threat Report, Vol.22, 2017, https:\/\/www.symantec.com\/security-center\/threat-report"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/1315245.1315261"},{"volume-title":"Proceedings of the 2001 IEEE Symposium on Security and Privacy (SP '01)","author":"Schultz Matthew G.","unstructured":"Matthew G. Schultz , Eleazar Eskin , Erez Zadok , and Salvatore J. Stolfo . 2001. Data Mining Methods for Detection of New Malicious Executables . In Proceedings of the 2001 IEEE Symposium on Security and Privacy (SP '01) . IEEE Computer Society, Washington, DC, USA, 38-. Matthew G. Schultz, Eleazar Eskin, Erez Zadok, and Salvatore J. Stolfo. 2001. Data Mining Methods for Detection of New Malicious Executables. In Proceedings of the 2001 IEEE Symposium on Security and Privacy (SP '01). IEEE Computer Society, Washington, DC, USA, 38-.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_7_1","volume-title":"Detection of New Malicious Code Using N-grams Signatures. Conference on Privacy, Security and Trust (Oct.","author":"Tony Abou-Assaleh","year":"2012","unstructured":"Abou-Assaleh Tony , Cercone Nick , Keselj Vlado , and Sweidan Ray . 2012 . Detection of New Malicious Code Using N-grams Signatures. Conference on Privacy, Security and Trust (Oct. 2004), 193--196 Abou-Assaleh Tony, Cercone Nick, Keselj Vlado, and Sweidan Ray. 2012. Detection of New Malicious Code Using N-grams Signatures. Conference on Privacy, Security and Trust (Oct. 2004), 193--196"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 15th conference on USENIX Security Symposium -","volume":"15","author":"Kirda Engin","unstructured":"Engin Kirda , Christopher Kruegel , Greg Banks , Giovanni Vigna , and Richard A. Kemmerer . 2006. Behavior-based spyware detection . In Proceedings of the 15th conference on USENIX Security Symposium - Volume 15 (USENIX-SS'06), Vol. 15. USENIX Association, Berkeley, CA, USA, pages. Engin Kirda, Christopher Kruegel, Greg Banks, Giovanni Vigna, and Richard A. Kemmerer. 2006. Behavior-based spyware detection. In Proceedings of the 15th conference on USENIX Security Symposium - Volume 15 (USENIX-SS'06), Vol. 15. USENIX Association, Berkeley, CA, USA, pages."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.5555\/1776434.1776449"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/1653662.1653691"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/SP.2012.16"},{"key":"e_1_3_2_1_12_1","volume-title":"International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions. Springer Berlin Heidelberg.","author":"P.","year":"2013","unstructured":"Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X., Bringas, P. G., & \u00c1lvarez, G. 2013 . PUMA: Permission Usage to Detect Malware in Android . In International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions. Springer Berlin Heidelberg. Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X., Bringas, P. G., & \u00c1lvarez, G. 2013. PUMA: Permission Usage to Detect Malware in Android. In International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions. Springer Berlin Heidelberg."},{"issue":"3","key":"e_1_3_2_1_13_1","first-page":"228","article-title":"Permission-based android malware detection","volume":"2","author":"W.","year":"2013","unstructured":"Aung, Z., and Zaw, W. 2013 . Permission-based android malware detection . In International Journal of Scientific & Technology Research , Vol. 2 ( 3 ). 228 -- 234 . Aung, Z., and Zaw, W. 2013. Permission-based android malware detection. In International Journal of Scientific & Technology Research, Vol. 2(3). 228--234.","journal-title":"International Journal of Scientific & Technology Research"}],"event":{"acronym":"ICNCC 2017","name":"ICNCC 2017: 2017 VI International Conference on Network, Communication and Computing","location":"Kunming China"},"container-title":["Proceedings of the 2017 VI International Conference on Network, Communication and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3171592.3171636","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3171592.3171636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:02:54Z","timestamp":1750215774000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3171592.3171636"}},"subtitle":["Permission-based Android Malware Feature Extraction Algorithm"],"short-title":[],"issued":{"date-parts":[[2017,12,8]]},"references-count":12,"alternative-id":["10.1145\/3171592.3171636","10.1145\/3171592"],"URL":"https:\/\/doi.org\/10.1145\/3171592.3171636","relation":{},"subject":[],"published":{"date-parts":[[2017,12,8]]},"assertion":[{"value":"2017-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}