{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T21:12:04Z","timestamp":1651871524798},"reference-count":18,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7,1]]},"abstract":"<p>This article describes how as day-to-day Android users are increasing, the Internet has become the type of environment preferred by attackers to inject malicious packages. This is content with the intention of gathering critical information, spying on user details, credentials, call logs, contact details, and tracking user location. Regrettably it is very hard to detect malware even with antivirus software\/packages. In addition, this type of attack is increasing day by day. In this article the authors have chosen a Supervised Learning Classification Tree-based algorithm to detect malware on the data set. Comparison amongst all the classifiers on the basis of accuracy and execution time are used to build the classifier model which has the highest executed detections.<\/p>","DOI":"10.4018\/ijncr.2017070101","type":"journal-article","created":{"date-parts":[[2018,1,29]],"date-time":"2018-01-29T17:56:53Z","timestamp":1517248613000},"page":"1-17","source":"Crossref","is-referenced-by-count":3,"title":["Malware Detection in Android Using Data Mining"],"prefix":"10.4018","volume":"6","author":[{"given":"Suparna","family":"Dasgupta","sequence":"first","affiliation":[{"name":"JIS College of Engineering, Kalyani, India"}]},{"given":"Soumyabrata","family":"Saha","sequence":"additional","affiliation":[{"name":"JIS College of Engineering, Kalyani, India"}]},{"given":"Suman Kumar","family":"Das","sequence":"additional","affiliation":[{"name":"JIS College of Engineering, Kalyani, India"}]}],"member":"2432","reference":[{"key":"IJNCR.2017070101-0","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74320-0_10"},{"key":"IJNCR.2017070101-1","article-title":"Scalable, behavior-based malware clustering","author":"U.Bayer","year":"2009).","journal-title":"Network and Distributed System Security Symposium (NDSS)"},{"key":"IJNCR.2017070101-2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"IJNCR.2017070101-3","doi-asserted-by":"publisher","DOI":"10.1109\/SASO.2013.8"},{"key":"IJNCR.2017070101-4","doi-asserted-by":"crossref","unstructured":"Egele M., Scholte T., Kirda E., & Kruegel C. (2012). A survey on automated dynamic malware analysis techniques and tools.","DOI":"10.1145\/2089125.2089126"},{"key":"IJNCR.2017070101-5","doi-asserted-by":"publisher","DOI":"10.1109\/ACT.2010.33"},{"key":"IJNCR.2017070101-6","unstructured":"Gupta S., Types of Malware and its Analysis, International Journal of Scientific and Engineering Research Volume 4, Issue 1, January-2013"},{"key":"IJNCR.2017070101-7","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-21212-8_9","article-title":"Systematic Analysis of Applied Data Mining Based Optimization Algorithms in Clinical Attribute Extraction and Classification for Diagnosis of Cardiac Patients","volume":"Vol. 96","author":"N.Kausar","year":"2016","journal-title":"Applications of Intelligent Optimization in Biology and Medicine"},{"key":"IJNCR.2017070101-8","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/70.1.163"},{"key":"IJNCR.2017070101-9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-59286-5_57"},{"key":"IJNCR.2017070101-10","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-009-0137-1"},{"key":"IJNCR.2017070101-11","unstructured":"Lueg, C. (2017). 8400 new Android malware sample every day- High Threat Situation remains unchanged. Retrieved from https:\/\/www.gdatasoftware.com\/blog\/2017\/04\/29712-8-400-new-android-malware-samples-every-day"},{"key":"IJNCR.2017070101-12","article-title":"Guessing and Entropy","author":"J.Massey","year":"1994","journal-title":"Proc. IEEE International Symposium on Information Theory"},{"key":"IJNCR.2017070101-13","unstructured":"Ros Quinlan, R. (1993). C4.5: Programs for Machine Learning. SAN Mateo, CA: Morgan Kaufmann Publishers."},{"key":"IJNCR.2017070101-14","doi-asserted-by":"crossref","unstructured":"Shannon, C.E. (1948). A Mathematical Theory of Communication. Bell System Technical Journal, 27, pp. 379\u2013423 & 623\u2013656.","DOI":"10.1002\/j.1538-7305.1948.tb00917.x"},{"key":"IJNCR.2017070101-15","doi-asserted-by":"crossref","unstructured":"Silwattananusarn T., & Tuwamsuk K. (2012). Data Mining and its Application for Knowledge Management: A Literature Review From 2007 to 2012. International Journal of Data Mining & Knowledge Management Process, 2(5).","DOI":"10.5121\/ijdkp.2012.2502"},{"key":"IJNCR.2017070101-16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39985-8_12"},{"key":"IJNCR.2017070101-17","unstructured":"Uppal, D., Mehra, V., & Verma, V. (2009). Basic Survey on Malware Analysis, Tools and Techniques. In A. D. Schmidt et al. (Eds.), Static Analysis of Executables for Collaborative Malware Detection on Android."}],"container-title":["International Journal of Natural Computing Research"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=198498","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T20:56:43Z","timestamp":1651870603000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJNCR.2017070101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2017,7,1]]},"references-count":18,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,7]]}},"URL":"https:\/\/doi.org\/10.4018\/ijncr.2017070101","relation":{},"ISSN":["1947-928X","1947-9298"],"issn-type":[{"value":"1947-928X","type":"print"},{"value":"1947-9298","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,1]]}}}