{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:00:31Z","timestamp":1757311231469,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.23919\/cnsm.2017.8256035","type":"proceedings-article","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T22:46:24Z","timestamp":1516056384000},"page":"1-9","source":"Crossref","is-referenced-by-count":20,"title":["Android malicious application detection using support vector machine and active learning"],"prefix":"10.23919","author":[{"given":"Bahman","family":"Rashidi","sequence":"first","affiliation":[]},{"given":"Carol","family":"Fung","sequence":"additional","affiliation":[]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.50"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-4063-1"},{"key":"ref11","article-title":"Andrubis-1, 000,000 apps later: A view on current android malware behaviors","author":"lindorfer","year":"2014","journal-title":"Proc The First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)"},{"journal-title":"6 1b smartphone users globally by 2020 overtaking basic fixed phone subscriptions","year":"0","author":"lunden","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.02.013"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348583"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2016.7727508"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-016-0918-z"},{"journal-title":"Android just hit a record 88% market share of all smartphones","year":"0","author":"nunez","key":"ref17"},{"key":"ref18","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"journal-title":"Number of apps available in leading app stores as of","year":"2017","author":"portal","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3115\/1613715.1613855"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511801389"},{"key":"ref27","article-title":"Active learning literature survey","volume":"1648","author":"settles","year":"2010","journal-title":"Computer Sciences Technical Report"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2015.2471196"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.03.004"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594391"},{"key":"ref8","first-page":"21","article-title":"A study of android application security","author":"enck","year":"2011","journal-title":"Proceedings of the 20th USENIX Conference on Security SEC'11"},{"key":"ref7","first-page":"393","article-title":"Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones","author":"enck","year":"2010","journal-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation OSDI'10"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464460"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2523813"},{"journal-title":"What is the price of free","year":"0","key":"ref1"},{"key":"ref20","first-page":"3","article-title":"A survey of android security threats and defenses","volume":"6","author":"rashidi","year":"2015","journal-title":"Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications (JoWUA)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.11.006"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860469"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140304"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2646584.2646586"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2012.34"},{"journal-title":"Algorithms and Architectures for Machine Learning Based on Regularized Neural Networks and Support Vector Approaches","year":"2001","author":"rychetsky","key":"ref25"}],"event":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2017,11,26]]},"location":"Tokyo","end":{"date-parts":[[2017,11,30]]}},"container-title":["2017 13th International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8241507\/8255966\/08256035.pdf?arnumber=8256035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T21:56:52Z","timestamp":1519941412000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8256035\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":30,"URL":"https:\/\/doi.org\/10.23919\/cnsm.2017.8256035","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}