{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T03:27:21Z","timestamp":1762918041825,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":18,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1145\/3340422.3343639","type":"proceedings-article","created":{"date-parts":[[2019,8,16]],"date-time":"2019-08-16T19:51:28Z","timestamp":1565985088000},"page":"33-40","source":"Crossref","is-referenced-by-count":7,"title":["Android Malware Prediction Using Extreme Learning Machine with Different Kernel Functions"],"prefix":"10.1145","author":[{"given":"Lov","family":"Kumar","sequence":"first","affiliation":[{"name":"BITS Pilani Hyderabad, Campus, India"}]},{"given":"Chinmay","family":"Hota","sequence":"additional","affiliation":[{"name":"BITS Pilani Hyderabad, Campus, India"}]},{"given":"Arvind","family":"Mahindru","sequence":"additional","affiliation":[{"name":"DAV University, India"}]},{"given":"Lalita Bhanu Murthy","family":"Neti","sequence":"additional","affiliation":[{"name":"BITS Pilani Hyderabad, Campus, India"}]}],"member":"320","reference":[{"key":"key-10.1145\/3340422.3343639-1","unstructured":"ARORA, A., AND PEDDOJU, S. K. Minimizing network traffic features for android mobile malware detection. In Proceedings of the 18th International Conference on Distributed Computing and Networking (2017), ACM, p. 32."},{"key":"key-10.1145\/3340422.3343639-2","unstructured":"ARORA, A., AND PEDDOJU, S. K. Ntpdroid: A hybrid android malware detector using network traffic and system permissions. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE) (2018), IEEE, pp. 808--813."},{"key":"key-10.1145\/3340422.3343639-3","unstructured":"CHIDAMBER, S. R., AND KEMERER, C. F. Towards a metrics suite for object oriented design."},{"key":"key-10.1145\/3340422.3343639-4","doi-asserted-by":"crossref","unstructured":"CHIDAMBER, S. R., AND KEMERER, C. F. A metrics suite for object oriented design. IEEE Transactions on software engineering 20, 6 (1994), 476--493.","DOI":"10.1109\/32.295895"},{"key":"key-10.1145\/3340422.3343639-5","unstructured":"DEMONTIS, A., MELIS, M., BIGGIO, B., MAIORCA, D., ARP, D., RIECK, K., CORONA, I., GIACINTO, G., AND ROLI, F. Yes, machine learning can be more secure! a case study on android malware detection. IEEE Transactions on Dependable and Secure Computing (2017)."},{"key":"key-10.1145\/3340422.3343639-6","doi-asserted-by":"crossref","unstructured":"HUANG, G.-B., ZHU, Q.-Y., AND SIEW, C.-K. Extreme learning machine: theory and applications. Neurocomputing 70, 1-3 (2006), 489--501.","DOI":"10.1016\/j.neucom.2005.12.126"},{"key":"key-10.1145\/3340422.3343639-7","unstructured":"KADIR, A. F. A., STAKHANOVA, N., AND GHORBANI, A. A. Android botnets: What urls are telling us. In International Conference on Network and System Security (2015), Springer, pp. 78--91."},{"key":"key-10.1145\/3340422.3343639-8","unstructured":"KUMAR, D. R., AND CHANAKYA, G. Refactoring framework for instance code smell detection. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) 3, 9 (2014)."},{"key":"key-10.1145\/3340422.3343639-9","unstructured":"KUMAR, L., SATAPATHY, S. M., AND KRISHNA, A. Application of smote and lssvm with various kernels for predicting refactoring at method level. In International Conference on Neural Information Processing (2018), Springer, pp. 150--161."},{"key":"key-10.1145\/3340422.3343639-10","doi-asserted-by":"crossref","unstructured":"KUMAR, L., SRIPADA, S. K., SUREKA, A., AND RATH, S. K. Effective fault prediction model developed using least square support vector machine (lssvm). Journal of Systems and Software 137 (2018), 686--712.","DOI":"10.1016\/j.jss.2017.04.016"},{"key":"key-10.1145\/3340422.3343639-11","unstructured":"KUMAR, M., MEENA, J., SINGH, R., AND VARDHAN, M. Data outsourcing: A threat to confidentiality, integrity, and availability. In 2015 International Conference on Green Computing and Internet of Things (ICGCIoT) (2015), IEEE, pp. 1496--1501."},{"key":"key-10.1145\/3340422.3343639-12","unstructured":"KUMAR, R., SINGH, J., AND KAUR, A. An empirical study of bad smell in code on maintenance effort. Int. J. Comput. Sci. Eng 5 (2016), 294--306."},{"key":"key-10.1145\/3340422.3343639-13","unstructured":"LI, W., AND HENRY, S. Maintenance metrics for the object oriented paradigm. In [1993] Proceedings First International Software Metrics Symposium (1993), IEEE, pp. 52--60."},{"key":"key-10.1145\/3340422.3343639-14","unstructured":"MAHINDRU, A., AND SINGH, P. Dynamic permissions based android malware detection using machine learning techniques. In Proceedings of the 10th Innovations in Software Engineering Conference (2017), ACM, pp. 202--210."},{"key":"key-10.1145\/3340422.3343639-15","unstructured":"MCLAUGHLIN, N., MARTINEZ DEL RINCON, J., KANG, B., YERIMA, S., MILLER, P., SEZER, S., SAFAEI, Y., TRICKEL, E., ZHAO, Z., DOUP&#201;, A., ET AL. Deep android malware detection. In Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy (2017), ACM, pp. 301--308."},{"key":"key-10.1145\/3340422.3343639-16","unstructured":"ROJAS, J. A. R., KERY, M. B., ROSENTHAL, S., AND DEY, A. Sampling techniques to improve big data exploration. In 2017 IEEE 7th symposium on large data analysis and visualization (LDAV) (2017), IEEE, pp. 26--35."},{"key":"key-10.1145\/3340422.3343639-17","doi-asserted-by":"crossref","unstructured":"SHEEN, S., ANITHA, R., AND NATARAJAN, V. Android based malware detection using a multifeature collaborative decision fusion approach. Neurocomputing 151 (2015), 905--912.","DOI":"10.1016\/j.neucom.2014.10.004"},{"key":"key-10.1145\/3340422.3343639-18","unstructured":"ZHOU, Y., AND JIANG, X. Dissecting android malware: Characterization and evolution. In 2012 IEEE symposium on security and privacy (2012), IEEE, pp. 95--109."}],"event":{"name":"the Asian Internet Engineering Conference","start":{"date-parts":[[2019,8,7]]},"sponsor":["SIGCOMM, ACM Special Interest Group on Data Communication","AIOT, Asian Institute of Technology"],"location":"Phuket, Thailand","end":{"date-parts":[[2019,8,9]]},"acronym":"AINTEC '19"},"container-title":["Proceedings of the Asian Internet Engineering Conference on   - AINTEC '19"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340422.3343639","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3343639&ftid=2080350&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:32Z","timestamp":1750268972000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3340422.3343639"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1145\/3340422.3343639","relation":{},"subject":[],"published":{"date-parts":[[2019]]}}}