{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T01:15:31Z","timestamp":1764897331725,"version":"3.46.0"},"reference-count":0,"publisher":"Canadian Center of Science and Education","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CIS"],"DOI":"10.5539\/cis.v5n2p79","type":"journal-article","created":{"date-parts":[[2012,2,28]],"date-time":"2012-02-28T04:24:14Z","timestamp":1330403054000},"source":"Crossref","is-referenced-by-count":0,"title":["Handset Malwares Threats Feature Extraction Based on Behavior Analysis"],"prefix":"10.5539","volume":"5","author":[{"given":"Marwa M.","family":"A. Efattah","sequence":"first","affiliation":[]},{"given":"Aliaa A. A.","family":"Youssif","sequence":"additional","affiliation":[]},{"given":"Ebada Sarhan","family":"Ahmed","sequence":"additional","affiliation":[]}],"member":"3486","published-online":{"date-parts":[[2012,2,28]]},"container-title":["Computer and Information Science"],"original-title":[],"link":[{"URL":"https:\/\/www.ccsenet.org\/journal\/index.php\/CIS\/article\/download\/13261\/10399","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T01:12:37Z","timestamp":1764897157000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.ccsenet.org\/journal\/index.php\/cis\/article\/view\/13261"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,2,28]]},"references-count":0,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2012,2,28]]}},"URL":"https:\/\/doi.org\/10.5539\/cis.v5n2p79","relation":{},"ISSN":["1913-8997","1913-8989"],"issn-type":[{"type":"electronic","value":"1913-8997"},{"type":"print","value":"1913-8989"}],"subject":[],"published":{"date-parts":[[2012,2,28]]}}}