iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1007/S11416-014-0226-7
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,11]],"date-time":"2024-08-11T04:28:28Z","timestamp":1723350508824},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,10,17]],"date-time":"2014-10-17T00:00:00Z","timestamp":1413504000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.1007\/s11416-014-0226-7","type":"journal-article","created":{"date-parts":[[2014,10,16]],"date-time":"2014-10-16T13:51:39Z","timestamp":1413467499000},"page":"9-17","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":126,"title":["Identifying Android malware using dynamically obtained features"],"prefix":"10.1007","volume":"11","author":[{"given":"Vitor Monte","family":"Afonso","sequence":"first","affiliation":[]},{"given":"Matheus Favero","family":"de Amorim","sequence":"additional","affiliation":[]},{"given":"Andr\u00e9 Ricardo Abed","family":"Gr\u00e9gio","sequence":"additional","affiliation":[]},{"given":"Glauco Barroso","family":"Junquera","sequence":"additional","affiliation":[]},{"given":"Paulo L\u00edcio","family":"de Geus","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,17]]},"reference":[{"key":"226_CR1","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., H\u00fcbner, M., Gascon, H., Rieck, K., Siemens, C.: Drebin: Effective and explainable detection of android malware in your pocket (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"226_CR2","doi-asserted-by":"crossref","unstructured":"Blasing, T., Batyuk, L., Schmidt, A.D., Camtepe, S.A., Albayrak, S.: An android application sandbox system for suspicious software detection. In: 2010 5th International Conference on Malicious and Unwanted Software (MALWARE), pp. 55\u201362. IEEE (2010)","DOI":"10.1109\/MALWARE.2010.5665792"},{"key":"226_CR3","unstructured":"DroidBox: Android application sandbox. https:\/\/code.google.com\/p\/droidbox\/ (2011)"},{"key":"226_CR4","unstructured":"Elish, K.O., Yao, D., Ryder, B.G.: User-centric dependence analysis for identifying malicious mobile apps. In: Workshop on Mobile Security Technologies (2012)"},{"key":"226_CR5","unstructured":"Enck, W., Gilbert, P., Chun, B., Cox, L., Jung, J., McDaniel, P., Sheth, A.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, pp. 1\u20136. USENIX Association (2010)"},{"key":"226_CR6","doi-asserted-by":"crossref","unstructured":"Felt, A., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 3\u201314. ACM (2011)","DOI":"10.1145\/2046614.2046618"},{"key":"226_CR7","unstructured":"Gartner: Gartner says worldwide sales of mobile phones declined 3 percent in third quarter of 2012; smartphone sales increased 47 percent. http:\/\/www.gartner.com\/newsroom\/id\/2237315 (2012)"},{"key":"226_CR8","doi-asserted-by":"crossref","unstructured":"Grace, M., Zhou, Y., Zhang, Q., Zou, S., Jiang, X.: Riskranker: scalable and accurate zero-day android malware detection. In: Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, pp. 281\u2013294. ACM (2012)","DOI":"10.1145\/2307636.2307663"},{"issue":"1","key":"226_CR9","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.: The weka data mining software: an update. ACM SIGKDD Explor. Newsl. 11(1), 10\u201318 (2009)","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"226_CR10","unstructured":"iSecLab: Andrubis: a tool for analyzing unknown android applications. http:\/\/blog.iseclab.org\/2012\/06\/04\/andrubis-a-tool-for-analyzing-unknown-android-applications-2\/ (2012)"},{"key":"226_CR11","unstructured":"Juniper: Juniper networks mobile threat center third annual mobile threats report: March 2012 through March 2013. http:\/\/www.juniper.net\/us\/en\/local\/pdf\/additional-resources\/3rd-jnpr-mobile-threats-report-exec-summary.pdf (2013)"},{"key":"226_CR12","doi-asserted-by":"crossref","unstructured":"Moser, A., Kruegel, C., Kirda, E.: Limits of static analysis for malware detection. In: Computer Security Applications Conference, 2007, ACSAC 2007, Twenty-Third Annual, pp. 421\u2013430. IEEE (2007)","DOI":"10.1109\/ACSAC.2007.21"},{"key":"226_CR13","first-page":"23","volume":"14","author":"S Poeplau","year":"2014","unstructured":"Poeplau, S., Fratantonio, Y., Bianchi, A., Kruegel, C., Vigna, G.: Execute this! analyzing unsafe and malicious dynamic code loading in android applications. NDSS 14, 23\u201326 (2014)","journal-title":"NDSS"},{"key":"226_CR14","doi-asserted-by":"crossref","unstructured":"Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X., Bringas, P.G., Alvarez, G.: Puma: Permission usage to detect malware in android. In: CISIS\/ICEUTE\/SOCO Special Sessions, pp. 289\u2013298 (2012)","DOI":"10.1007\/978-3-642-33018-6_30"},{"key":"226_CR15","unstructured":"Spreitzenbarth, M.: The Evil Inside a Droid\u2014Android Malware: past, present and future. In: E.F.S. Institute (ed.) Proceedings of the 1st Baltic Conference on Network Security & Forensics, pp. 41\u201359 (2012)"},{"key":"226_CR16","doi-asserted-by":"crossref","unstructured":"Spreitzenbarth, M., Freiling, F., Echtler, F., Schreck, T., Hoffmann, J.: Mobile-sandbox: having a deeper look into android applications. In: Proceedings of the 28th Annual ACM Symposium on Applied Computing, pp. 1808\u20131815. ACM (2013)","DOI":"10.1145\/2480362.2480701"},{"key":"226_CR17","doi-asserted-by":"publisher","unstructured":"Su, X., Chuah, M., Tan, G.: Smartphone dual defense protection framework: detecting malicious applications in android markets. In: 2012 Eighth International Conference on Mobile Ad-hoc and Sensor Networks (MSN), pp. 153\u2013160. doi: 10.1109\/MSN.2012.43 (2012)","DOI":"10.1109\/MSN.2012.43"},{"key":"226_CR18","unstructured":"VRT: Changing the imei, provider, model, and phone number in the android emulator. http:\/\/vrt-blog.snort.org\/2013\/04\/changing-imei-provider-model-and-phone.html (2013)"},{"key":"226_CR19","doi-asserted-by":"publisher","unstructured":"Wu, D.J., Mao, C.H., Wei, T.E., Lee, H.M., Wu, K.P.: Droidmat: Android malware detection through manifest and api calls tracing. In: Seventh Asia Joint Conference on Information Security (Asia JCIS). doi: 10.1109\/AsiaJCIS.2012.18 (2012)","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"226_CR20","unstructured":"Yan, L.K., Yin, H.: Droidscope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In: Proceedings of the 21st USENIX Conference on Security Symposium. USENIX Association (2012)"},{"key":"226_CR21","doi-asserted-by":"crossref","unstructured":"Zheng, C., Zhu, S., Dai, S., Gu, G., Gong, X., Han, X., Zou, W.: Smartdroid: an automatic system for revealing ui-based trigger conditions in android applications. In: Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 93\u2013104. ACM (2012)","DOI":"10.1145\/2381934.2381950"},{"key":"226_CR22","doi-asserted-by":"crossref","unstructured":"Zheng, M., Sun, M., Lui, J.C.: Droidanalytics: a signature based analytic system to collect, extract, analyze and associate android malware. In: Proceedings of The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 13) (2013)","DOI":"10.1109\/TrustCom.2013.25"},{"key":"226_CR23","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: Proceedings of the 33rd IEEE Symposium on Security and Privacy (2012)","DOI":"10.1109\/SP.2012.16"},{"key":"226_CR24","unstructured":"Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In: Proceedings of the 19th Annual Network and Distributed System Security Symposium (2012)"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-014-0226-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-014-0226-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-014-0226-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,16]],"date-time":"2019-08-16T07:59:07Z","timestamp":1565942347000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-014-0226-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,17]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,2]]}},"alternative-id":["226"],"URL":"https:\/\/doi.org\/10.1007\/s11416-014-0226-7","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,17]]}}}