{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T21:42:05Z","timestamp":1768340525401,"version":"3.49.0"},"reference-count":0,"publisher":"Centre for Multidisciplinary Research, Innovation and Collaboration (C-MRiC)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJCSA"],"published-print":{"date-parts":[[2016,12,7]]},"DOI":"10.22619\/ijcsa.2016.100111","type":"journal-article","created":{"date-parts":[[2020,7,12]],"date-time":"2020-07-12T13:49:23Z","timestamp":1594561763000},"page":"231-255","source":"Crossref","is-referenced-by-count":27,"title":["N-gram Opcode Analysis for Android Malware Detection"],"prefix":"10.22619","volume":"1","author":[{"given":"BooJoong","family":"Kang","sequence":"first","affiliation":[]},{"given":"Suleiman Y.","family":"Yerima","sequence":"additional","affiliation":[]},{"given":"Sakir","family":"Sezer","sequence":"additional","affiliation":[]},{"given":"Kieran","family":"McLaughlin","sequence":"additional","affiliation":[]}],"member":"9907","published-online":{"date-parts":[[2016,11,7]]},"container-title":["International Journal on Cyber Situational Awareness"],"original-title":[],"deposited":{"date-parts":[[2020,7,12]],"date-time":"2020-07-12T13:49:34Z","timestamp":1594561774000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.c-mric.com\/100111"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,7]]},"references-count":0,"aliases":["10.22619\/ijcsa.2016.1001011"],"journal-issue":{"issue":"1","published-online":{"date-parts":[[2016,11,7]]},"published-print":{"date-parts":[[2016,12,7]]}},"URL":"https:\/\/doi.org\/10.22619\/ijcsa.2016.100111","relation":{},"ISSN":["2057-2182","2633-495X"],"issn-type":[{"value":"2057-2182","type":"print"},{"value":"2633-495X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,11,7]]}}}