{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T11:05:55Z","timestamp":1771326355967,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T00:00:00Z","timestamp":1608595200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,22]]},"DOI":"10.1145\/3428363.3428375","type":"proceedings-article","created":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T14:40:56Z","timestamp":1608648056000},"page":"115-125","source":"Crossref","is-referenced-by-count":10,"title":["An Optimized Decision Tree based Android Malware Detection Approach using Machine Learning"],"prefix":"10.1145","author":[{"given":"Mosaddek","family":"Hossain","sequence":"first","affiliation":[{"name":"Bangladesh University of Engineering and Technology, Bangladesh"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Suzzana","family":"Rafi","sequence":"additional","affiliation":[{"name":"Bangladesh University of Engineering and Technology, Bangladesh"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shohrab","family":"Hossain","sequence":"additional","affiliation":[{"name":"Bangladesh University of Engineering and Technology, Bangladesh"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2020,12,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"A.\u00a0S.\u00a0M. Ahsan-Ul-Haque Md.\u00a0Shohrab Hossain and Mohammed Atiquzzaman. 2018. Sequencing System Calls for Effective Malware Detection in Android. In IEEE GLOBECOM. IEEE Abu Dhabi UAE.  A.\u00a0S.\u00a0M. Ahsan-Ul-Haque Md.\u00a0Shohrab Hossain and Mohammed Atiquzzaman. 2018. Sequencing System Calls for Effective Malware Detection in Android. In IEEE GLOBECOM. IEEE Abu Dhabi UAE.","DOI":"10.1109\/GLOCOM.2018.8647967"},{"key":"e_1_3_2_1_2_1","volume-title":"Random Forest Classification for Detecting Android Malware. In IEEE International Conference on Green Computing and Communications. IEEE","author":"S."},{"key":"e_1_3_2_1_3_1","first-page":"272","article-title":"Random forests and decision trees","volume":"9","author":"Ali Jehad","year":"2012","journal-title":"International Journal of Computer Science Issues (IJCSI)"},{"key":"e_1_3_2_1_4_1","volume-title":"DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. In NDSS, Vol.\u00a014","author":"Arp Daniel","year":"2014"},{"key":"e_1_3_2_1_5_1","unstructured":"Md.\u00a0Ishtiaq Ashiq Protick Bhowmick Md.\u00a0Shohrab Hossain and Husnu\u00a0S. Narman. 2019. Domain Flux based DGA Botnet Detection Using Feedforward Neural Network. In IEEE Military Communications (MILCOM). IEEE Norfolk VA USA.  Md.\u00a0Ishtiaq Ashiq Protick Bhowmick Md.\u00a0Shohrab Hossain and Husnu\u00a0S. Narman. 2019. Domain Flux based DGA Botnet Detection Using Feedforward Neural Network. In IEEE Military Communications (MILCOM). IEEE Norfolk VA USA."},{"key":"e_1_3_2_1_6_1","unstructured":"Bradley Barth. 2018. New Desert Scorpion spyware found in malicious chat app aimed at Palestinians. Retrieved October 7 2020 from https:\/www.scmagazine.com\/home\/security-news\/rsa-2018\/new-desert-scorpion-spyware-found-in-malicious-chat-app-aimed-at-palestinians\/  Bradley Barth. 2018. New Desert Scorpion spyware found in malicious chat app aimed at Palestinians. Retrieved October 7 2020 from https:\/www.scmagazine.com\/home\/security-news\/rsa-2018\/new-desert-scorpion-spyware-found-in-malicious-chat-app-aimed-at-palestinians\/"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Leo Breiman. 2001. Random forests. Machine learning 45 1 (2001) 5\u201332.  Leo Breiman. 2001. Random forests. Machine learning 45 1 (2001) 5\u201332.","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_8_1","volume-title":"Machine Learning-Project II","author":"Drazin Sam"},{"key":"e_1_3_2_1_9_1","unstructured":"Mainuddin\u00a0Ahmad Jonas Risul Islam Md.\u00a0Shohrab Hossain Husnu\u00a0S. Narman and M. Atiquzzaman. 2019. An Intelligent System for Preventing SSL Stripping-based Session Hijacking Attacks. In IEEE Military Communications (MILCOM). IEEE Norfolk VA USA.  Mainuddin\u00a0Ahmad Jonas Risul Islam Md.\u00a0Shohrab Hossain Husnu\u00a0S. Narman and M. Atiquzzaman. 2019. An Intelligent System for Preventing SSL Stripping-based Session Hijacking Attacks. In IEEE Military Communications (MILCOM). IEEE Norfolk VA USA."},{"key":"e_1_3_2_1_10_1","first-page":"271","article-title":"Comparative study of attribute selection using gain ratio and correlation based feature selection","volume":"2","author":"Karegowda Asha\u00a0Gowda","year":"2010","journal-title":"International Journal of Information Technology and Knowledge Management"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2789219"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.02.013"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.11.021"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022643204877"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.11.028"},{"key":"e_1_3_2_1_16_1","volume-title":"7th Palestinian International Conference on Electrical and Computer Engineering (PICECE). IEEE, Gaza, Palestine, 1\u20136.","author":"Ahmad\u00a0Abu Samra Aiman","year":"2019"},{"key":"e_1_3_2_1_17_1","unstructured":"Ian\u00a0H. Witten Eibe Frank Mark\u00a0A. Hall and Christopher\u00a0J. Pal. 2016. Data Mining Fourth Edition: Practical Machine Learning Tools and Techniques (4th ed.). Morgan Kaufmann Publishers Inc. San Francisco CA USA.  Ian\u00a0H. Witten Eibe Frank Mark\u00a0A. Hall and Christopher\u00a0J. Pal. 2016. Data Mining Fourth Edition: Practical Machine Learning Tools and Techniques (4th ed.). Morgan Kaufmann Publishers Inc. San Francisco CA USA."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"e_1_3_2_1_19_1","volume-title":"IEEE 27th International Conference on Advanced Information Networking and Applications (AINA). IEEE","author":"Yerima Y."},{"key":"e_1_3_2_1_20_1","volume-title":"Android Malware Detection Using Parallel Machine Learning Classifiers. In Eighth International Conference on Next Generation Mobile Applications, Services and Technologies. IEEE","author":"Yerima Y.","year":"2014"},{"key":"e_1_3_2_1_21_1","unstructured":"Mehedee Zaman Mohammad\u00a0Rakib Amin Md.\u00a0Shohrab Hossain and Mohammed Atiquzzaman. 2016. Behavioral Malware Detection Approaches for Android. In IEEE ICC. IEEE Kuala Lumpur Malaysia.  Mehedee Zaman Mohammad\u00a0Rakib Amin Md.\u00a0Shohrab Hossain and Mohammed Atiquzzaman. 2016. Behavioral Malware Detection Approaches for Android. In IEEE ICC. IEEE Kuala Lumpur Malaysia."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2947861"}],"event":{"name":"7th NSysS 2020: 7th International Conference on Networking, Systems and Security","location":"Dhaka Bangladesh","acronym":"7th NSysS 2020"},"container-title":["7th International Conference on Networking, Systems and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3428363.3428375","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3428363.3428375","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:03Z","timestamp":1750197723000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3428363.3428375"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,22]]},"references-count":22,"alternative-id":["10.1145\/3428363.3428375","10.1145\/3428363"],"URL":"https:\/\/doi.org\/10.1145\/3428363.3428375","relation":{},"subject":[],"published":{"date-parts":[[2020,12,22]]}}}