{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:20:37Z","timestamp":1730344837132,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.23919\/tma.2018.8506545","type":"proceedings-article","created":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T19:53:55Z","timestamp":1540497235000},"page":"1-8","source":"Crossref","is-referenced-by-count":13,"title":["An Artificial Arms Race: Could it Improve Mobile Malware Detectors?"],"prefix":"10.23919","author":[{"given":"Rapahel","family":"Bronfman-Nadas","sequence":"first","affiliation":[]},{"given":"Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]},{"given":"John T.","family":"Jacobs","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"229","article-title":"Snort: Lightweight intrusion detection for networks","volume":"99","author":"roesch","year":"1999","journal-title":"LISA"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3067695.3082508"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1569901.1570111"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1145\/2897845.2897856","article-title":"Mystique: Evolving android malware for auditing anti-malware tools","author":"meng","year":"2016","journal-title":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security ACM"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2012.34"},{"key":"ref15","article-title":"Effective linear genetic programming","author":"brameier","year":"2001","journal-title":"Neural Networks in Medical Data Mining IEEE Transactions on Evolutionary Computation Tech Rep"},{"journal-title":"Data Mining Tools See5 and C5 0","year":"2018","author":"quinlan","key":"ref16"},{"key":"ref17","article-title":"Contam-inant removal for android malware detection systems","author":"sun","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2353996"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/PDP.2015.54","article-title":"Review of the mobile malware detection approaches","author":"skovoroda","year":"2015","journal-title":"2015 23rd Euromicro International Conference on Parallel Distributed and Network-Based Processing"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MOBILESoft.2017.23"},{"key":"ref8","first-page":"4366","volume":"11","author":"kayack","year":"2011","journal-title":"Can a good offense be a good defense? vulnerability testing of anomaly detectors through an artificial arms race"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s12065-011-0065-0"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2013.88"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2699220"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180414"}],"event":{"name":"2018 Network Traffic Measurement and Analysis Conference (TMA)","start":{"date-parts":[[2018,6,26]]},"location":"Vienna","end":{"date-parts":[[2018,6,29]]}},"container-title":["2018 Network Traffic Measurement and Analysis Conference (TMA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8488332\/8506485\/08506545.pdf?arnumber=8506545","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T13:26:48Z","timestamp":1643203608000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8506545\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.23919\/tma.2018.8506545","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}