{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T14:28:24Z","timestamp":1774967304700,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T00:00:00Z","timestamp":1599696000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,9,10]]},"DOI":"10.1145\/3410530.3414598","type":"proceedings-article","created":{"date-parts":[[2020,9,12]],"date-time":"2020-09-12T19:56:35Z","timestamp":1599940595000},"page":"568-572","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Malware detection using artificial bee colony algorithm"],"prefix":"10.1145","author":[{"given":"Farid Ghareh","family":"Mohammadi","sequence":"first","affiliation":[{"name":"University of Georgia"}]},{"given":"Farzan","family":"Shenavarmasouleh","sequence":"additional","affiliation":[{"name":"University of Georgia"}]},{"given":"M. Hadi","family":"Amini","sequence":"additional","affiliation":[{"name":"Florida International University"}]},{"given":"Hamid R.","family":"Arabnia","sequence":"additional","affiliation":[{"name":"University of Georgia"}]}],"member":"320","published-online":{"date-parts":[[2020,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"091","article-title":"Heuristic malware detection","volume":"8","author":"Bradicich Thomas M","year":"2012","unstructured":"Thomas M Bradicich , Richard E Harper , and William J Piazza . 2012 . Heuristic malware detection . US Patent 8 , 091 ,127. Thomas M Bradicich, Richard E Harper, and William J Piazza. 2012. Heuristic malware detection. US Patent 8,091,127.","journal-title":"US Patent"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2957429"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2019.8769039"},{"key":"e_1_3_2_1_4_1","first-page":"997","article-title":"Detecting script-based malware using emulation and heuristics","volume":"8","author":"Green Jonathon Patrick","year":"2015","unstructured":"Jonathon Patrick Green , Anjali Doulatram Chandnani , and Simon David Christensen . 2015 . Detecting script-based malware using emulation and heuristics . US Patent 8 , 997 ,233. Jonathon Patrick Green, Anjali Doulatram Chandnani, and Simon David Christensen. 2015. Detecting script-based malware using emulation and heuristics. US Patent 8,997,233.","journal-title":"US Patent"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2013.09.016"},{"key":"e_1_3_2_1_7_1","volume-title":"Arabnia","author":"Mohammadi F. Ghareh","year":"2020","unstructured":"F. Ghareh Mohammadi , M Hadi Amini , and Hamid R . Arabnia . 2020 . Applications of nature-inspired algorithms for dimension reduction: enabling efficient data analytics. In Optimization, Learning, and Control for Interdependent Complex Networks. Springer , 67--84. F. Ghareh Mohammadi, M Hadi Amini, and Hamid R. Arabnia. 2020. Applications of nature-inspired algorithms for dimension reduction: enabling efficient data analytics. In Optimization, Learning, and Control for Interdependent Complex Networks. Springer, 67--84."},{"key":"e_1_3_2_1_8_1","volume-title":"Arabnia","author":"Mohammadi F. Ghareh","year":"2020","unstructured":"F. Ghareh Mohammadi , M Hadi Amini , and Hamid R . Arabnia . 2020 . Evolutionary Computation, Optimization , and Learning Algorithms for Data Science. In Optimization, Learning, and Control for Interdependent Complex Networks. Springer , 37--65. F. Ghareh Mohammadi, M Hadi Amini, and Hamid R. Arabnia. 2020. Evolutionary Computation, Optimization, and Learning Algorithms for Data Science. In Optimization, Learning, and Control for Interdependent Complex Networks. Springer, 37--65."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2016.12.003"},{"key":"e_1_3_2_1_10_1","volume-title":"Causes of Misleading Statistics and Research Results Irreproducibility: A Concise Review. In 2019 International Conference on Computational Science and Computational Intelligence (CSCI). 465--470","author":"Shenavarmasouleh F.","unstructured":"F. Shenavarmasouleh and Hamid R. Arabnia . 2019 . Causes of Misleading Statistics and Research Results Irreproducibility: A Concise Review. In 2019 International Conference on Computational Science and Computational Intelligence (CSCI). 465--470 . F. Shenavarmasouleh and Hamid R. Arabnia. 2019. Causes of Misleading Statistics and Research Results Irreproducibility: A Concise Review. In 2019 International Conference on Computational Science and Computational Intelligence (CSCI). 465--470."},{"key":"e_1_3_2_1_11_1","volume-title":"Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers. Future generation computer systems 78","author":"Wang Wei","year":"2018","unstructured":"Wei Wang , Yuanyuan Li , Xing Wang , Jiqiang Liu , and Xiangliang Zhang . 2018. Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers. Future generation computer systems 78 ( 2018 ), 987--994. Wei Wang, Yuanyuan Li, Xing Wang, Jiqiang Liu, and Xiangliang Zhang. 2018. Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers. Future generation computer systems 78 (2018), 987--994."},{"key":"e_1_3_2_1_12_1","volume-title":"Droidfusion: A novel multilevel classifier fusion approach for android malware detection","author":"Yerima Suleiman Y","year":"2018","unstructured":"Suleiman Y Yerima and Sakir Sezer . 2018 . Droidfusion: A novel multilevel classifier fusion approach for android malware detection . IEEE transactions on cybernetics 49, 2 (2018), 453--466. Suleiman Y Yerima and Sakir Sezer. 2018. Droidfusion: A novel multilevel classifier fusion approach for android malware detection. IEEE transactions on cybernetics 49, 2 (2018), 453--466."}],"event":{"name":"UbiComp\/ISWC '20: 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and 2020 ACM International Symposium on Wearable Computers","location":"Virtual Event Mexico","acronym":"UbiComp\/ISWC '20","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410530.3414598","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3410530.3414598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:32:00Z","timestamp":1750195920000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410530.3414598"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,10]]},"references-count":11,"alternative-id":["10.1145\/3410530.3414598","10.1145\/3410530"],"URL":"https:\/\/doi.org\/10.1145\/3410530.3414598","relation":{},"subject":[],"published":{"date-parts":[[2020,9,10]]},"assertion":[{"value":"2020-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}