{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:38:09Z","timestamp":1730342289283,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.23919\/apsipa.2018.8659583","type":"proceedings-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T23:11:49Z","timestamp":1552950709000},"page":"1556-1563","source":"Crossref","is-referenced-by-count":1,"title":["Chatting Application Monitoring on Android System and its Detection based on the Correlation Test"],"prefix":"10.23919","author":[{"given":"Yafei","family":"Li","sequence":"first","affiliation":[]},{"given":"Jiageng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Anthony T.S.","family":"Ho","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Droid APIMiner Mining API-Level Features for Robust Malware Detection in Android","year":"2013","author":"aafer","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2013.88"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199486"},{"key":"ref13","first-page":"10111015","article-title":"Kernel-based behavior analysis for android malware detection","author":"isohara","year":"2012","journal-title":"Seventh International Conference on Computational Intelligence and Security"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2012.34"},{"key":"ref15","first-page":"300305","article-title":"Machine learning for android malware detection using permission and api calls","author":"peiravian","year":"2014","journal-title":"IEEE International Conference on Tools with Artificial Intelligence"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2517312.2517315"},{"key":"ref17","first-page":"16661671","article-title":"Applying machine learning classi-fiers to dynamic android malware detection at scale","author":"amos","year":"2013","journal-title":"Wireless Communications and Mobile Computing Conference"},{"key":"ref18","first-page":"2536","article-title":"Analysis of bayesian classification-based approaches for android malware detection","volume":"8","author":"yerima","year":"2016","journal-title":"LET Information Security"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.11.001"},{"journal-title":"LINE Free Calls & Messages","year":"2018","key":"ref28"},{"key":"ref4","first-page":"335","volume":"6","author":"rashidi","year":"2015","journal-title":"A survey of android security threats and defenses"},{"year":"2018","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2386139"},{"journal-title":"Crowdroid Behavior-Based Malware Detection System for Android","year":"2011","author":"burguera","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2005.08.005"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382205"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0148-x"},{"key":"ref7","first-page":"281294","article-title":"Riskranker:scalable and accurate zero-day android malware detection","author":"grace","year":"2012","journal-title":"International Conference on Mobile Systems Applications and Services"},{"journal-title":"All Your Droid Are Belong to Us A Survey of Current Android Attacks","year":"2011","author":"christin timothy vidas","key":"ref2"},{"key":"ref9","first-page":"6269","article-title":"Droidmat: Android malware detection through manifest and api calls tracing","author":"jie wu","year":"2012","journal-title":"Information Security"},{"journal-title":"The entire list of mobile spysoftware applications","year":"2018","key":"ref1"},{"key":"ref20","first-page":"153","article-title":"A multi-view context-aware approach to android malware detection and malicious code localization","author":"narayanan","year":"2017","journal-title":"Empirical Software Engineering"},{"journal-title":"Probability and Statistics","year":"2009","author":"gairong","key":"ref22"},{"journal-title":"Accessibility","year":"2018","key":"ref21"},{"key":"ref24","article-title":"Kendall tau metric","author":"nelsen","year":"2001","journal-title":"Encyclopedia of Mathematics"},{"journal-title":"Research Design and Statistical Analysis","year":"2010","author":"myers","key":"ref23"},{"year":"2018","key":"ref26"},{"year":"2018","key":"ref25"}],"event":{"name":"2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","start":{"date-parts":[[2018,11,12]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2018,11,15]]}},"container-title":["2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8648538\/8659446\/08659583.pdf?arnumber=8659583","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T23:31:43Z","timestamp":1598225503000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8659583\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":29,"URL":"https:\/\/doi.org\/10.23919\/apsipa.2018.8659583","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}