{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T11:44:12Z","timestamp":1726227852619},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031425189"},{"type":"electronic","value":"9783031425196"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-42519-6_11","type":"book-chapter","created":{"date-parts":[[2023,8,26]],"date-time":"2023-08-26T21:01:51Z","timestamp":1693083711000},"page":"111-121","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bytecode-Based Android Malware Detection Applying Convolutional Neural Networks"],"prefix":"10.1007","author":[{"given":"Alberto","family":"Miranda-Garcia","sequence":"first","affiliation":[]},{"given":"Iker","family":"Pastor-L\u00f3pez","sequence":"additional","affiliation":[]},{"given":"Borja Sanz","family":"Urquijo","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 Gaviria","family":"de la Puerta","sequence":"additional","affiliation":[]},{"given":"Pablo Garc\u00eda","family":"Bringas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,27]]},"reference":[{"doi-asserted-by":"publisher","unstructured":"Arp, D., Spreitzenbarth, M., H\u00fcbner, M., Gascon, H., Rieck, K.: Drebin: effective and explainable detection of android malware in your pocket. In: Proceedings 2014 Network and Distributed System Security Symposium. Internet Society (2014). https:\/\/doi.org\/10.14722\/ndss.2014.23247","key":"11_CR1","DOI":"10.14722\/ndss.2014.23247"},{"key":"11_CR2","first-page":"228","volume":"2","author":"Z Aung","year":"2013","unstructured":"Aung, Z., Zaw, W.T.: Permission-based android malware detection. Int. J. Sci. Technol. Res. 2, 228\u2013234 (2013)","journal-title":"Int. J. Sci. Technol. Res."},{"issue":"1","key":"11_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/00450618.2016.1182589","volume":"50","author":"R Chanajitt","year":"2018","unstructured":"Chanajitt, R., Viriyasitavat, W., Choo, K.K.R.: Forensic analysis and security assessment of android m-banking apps. Aust. J. Forensic Sci. 50(1), 3\u201319 (2018). https:\/\/doi.org\/10.1080\/00450618.2016.1182589","journal-title":"Aust. J. Forensic Sci."},{"doi-asserted-by":"publisher","unstructured":"Chen, J., Wang, C., Zhao, Z., Chen, K., Du, R., Ahn, G.J.: Uncovering the face of android ransomware: characterization and real-time detection. IEEE Trans. Inf. Forensics Secur. (2018). https:\/\/doi.org\/10.1109\/TIFS.2017.2787905","key":"11_CR4","DOI":"10.1109\/TIFS.2017.2787905"},{"issue":"1","key":"11_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11416-015-0261-z","volume":"13","author":"A Damodaran","year":"2017","unstructured":"Damodaran, A., Troia, F.D., Visaggio, C.A., Austin, T.H., Stamp, M.: A comparison of static, dynamic, and hybrid analysis for malware detection. J. Comput. Virol. Hacking Tech. 13(1), 1\u201312 (2017). https:\/\/doi.org\/10.1007\/s11416-015-0261-z","journal-title":"J. Comput. Virol. Hacking Tech."},{"unstructured":"Erturk, E.: A case study in open source software security and privacy: android adware. In: World Congress on Internet Security (WorldCIS-2012) (2012)","key":"11_CR6"},{"doi-asserted-by":"publisher","unstructured":"Hashemi, M.: Enlarging smaller images before inputting into convolutional neural network: zero-padding vs. interpolation. J. Big Data 6(1), 98 (2019). https:\/\/doi.org\/10.1186\/s40537-019-0263-7","key":"11_CR7","DOI":"10.1186\/s40537-019-0263-7"},{"doi-asserted-by":"publisher","unstructured":"Hegedus, J., Miche, Y., Ilin, A., Lendasse, A.: Methodology for behavioral-based malware analysis and detection using random projections and k-nearest neighbors classifiers. In: 2011 Seventh International Conference on Computational Intelligence and Security, pp. 1016\u20131023 (2011). https:\/\/doi.org\/10.1109\/CIS.2011.227","key":"11_CR8","DOI":"10.1109\/CIS.2011.227"},{"doi-asserted-by":"publisher","unstructured":"Iadarola, G., Martinelli, F., Mercaldo, F., Santone, A.: Formal methods for android banking malware analysis and detection. In: 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), pp. 331\u2013336 (2019). https:\/\/doi.org\/10.1109\/IOTSMS48152.2019.8939172","key":"11_CR9","DOI":"10.1109\/IOTSMS48152.2019.8939172"},{"doi-asserted-by":"publisher","unstructured":"Jeong, Y.s., Lee, H.t., Cho, S.j., Han, S., Park, M.: A kernel-based monitoring approach for analyzing malicious behavior on android. In: Proceedings of the 29th Annual ACM Symposium on Applied Computing, pp. 1737\u20131738. Association for Computing Machinery, New York, NY, USA (2014). https:\/\/doi.org\/10.1145\/2554850.2559915","key":"11_CR10","DOI":"10.1145\/2554850.2559915"},{"doi-asserted-by":"publisher","unstructured":"Khariwal, K., Singh, J., Arora, A.: Ipdroid: android malware detection using intents and permissions. In: 2020 4th Conference on Smart Trends in System Security and Sustainability (WorldS4), pp. 197\u2013202 (2020). https:\/\/doi.org\/10.1109\/WorldS450073.2020.9210414","key":"11_CR11","DOI":"10.1109\/WorldS450073.2020.9210414"},{"doi-asserted-by":"publisher","unstructured":"Mahdavifar, S., Abdul Kadir, A.F., Fatemi, R., Alhadidi, D., Ghorbani, A.A.: Dynamic android malware category classification using semi-supervised deep learning. In: 2020 IEEE International Conference on Cyber Science and Technology Congress (CyberSciTech) (2020). https:\/\/doi.org\/10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00094","key":"11_CR12","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00094"},{"doi-asserted-by":"publisher","unstructured":"Martinelli, F., Mercaldo, F., Nardone, V., Santone, A.: Twinkle twinkle little droiddream, how i wonder what you are? In: 2017 IEEE Workshop on Metrology for AeroSpace (MetroAeroSpace) (2017). https:\/\/doi.org\/10.1109\/MetroAeroSpace.2017.7999579","key":"11_CR13","DOI":"10.1109\/MetroAeroSpace.2017.7999579"},{"key":"11_CR14","doi-asserted-by":"publisher","DOI":"10.1145\/3329786","author":"O Or-Meir","year":"2019","unstructured":"Or-Meir, O., Nissim, N., Elovici, Y., Rokach, L.: Dynamic malware analysis in the modern era-a state of the art survey. ACM (2019). https:\/\/doi.org\/10.1145\/3329786","journal-title":"ACM"},{"doi-asserted-by":"publisher","unstructured":"Saad, M.H., Serageldin, A., Salama, G.I.: Android spyware disease and medication. In: 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec), pp. 118\u2013125 (2015). https:\/\/doi.org\/10.1109\/InfoSec.2015.7435516","key":"11_CR15","DOI":"10.1109\/InfoSec.2015.7435516"},{"key":"11_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-11747-3_3","volume-title":"Engineering Secure Software and Systems","author":"I Santos","year":"2010","unstructured":"Santos, I., Brezo, F., Nieves, J., Penya, Y.K., Sanz, B., Laorden, C., Bringas, P.G.: Idea: Opcode-Sequence-Based Malware Detection. In: Massacci, F., Wallach, D., Zannone, N. (eds.) ESSoS 2010. LNCS, vol. 5965, pp. 35\u201343. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-11747-3_3"},{"doi-asserted-by":"publisher","unstructured":"Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X., Bringas, P.G., \u00c1lvarez, G.: PUMA: permission usage to detect malware in android. In: International Joint Conference CISIS\u201912-ICEUTE\u201912-SOCO\u201912 Special Sessions, pp. 289\u2013298. Springer, Berlin, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-33018-6_30","key":"11_CR17","DOI":"10.1007\/978-3-642-33018-6_30"},{"doi-asserted-by":"publisher","unstructured":"Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: Andromaly: a behavioral malware detection framework for android devices. J. Intell. Inf. Syst. 38(1), 161\u2013190 (2012). https:\/\/doi.org\/10.1007\/s10844-010-0148-x","key":"11_CR18","DOI":"10.1007\/s10844-010-0148-x"},{"key":"11_CR19","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-319-12280-9_13","volume-title":"Cryptology and Network Security","author":"A Sharma","year":"2014","unstructured":"Sharma, A., Dash, S.K.: Mining API calls and permissions for android malware detection. In: Gritzalis, D., Kiayias, A., Askoxylakis, I. (eds.) Cryptology and Network Security, pp. 191\u2013205. Springer International Publishing, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-12280-9_13"},{"unstructured":"Statista: global mobile OS market share 2023 (2023). https:\/\/www.statista.com\/statistics\/272698\/global-market-share-held-by-mobile-operating-systems-since-2009\/","key":"11_CR20"},{"doi-asserted-by":"publisher","unstructured":"Su, X., Chuah, M., Tan, G.: Smartphone dual defense protection framework: detecting malicious applications in android markets. In: 2012 8th International Conference on Mobile Ad-hoc and Sensor Networks (MSN) (2012). https:\/\/doi.org\/10.1109\/MSN.2012.43","key":"11_CR21","DOI":"10.1109\/MSN.2012.43"},{"issue":"3","key":"11_CR22","doi-asserted-by":"publisher","first-page":"10","DOI":"10.5281\/zenodo.3252963","volume":"16","author":"D Vidyarthi","year":"2019","unstructured":"Vidyarthi, D., Kumar, C., Rakshit, S., Chansarkar, S.: Static malware analysis to identify ransomware properties. Int. J. Comput. Sci. Issues 16(3), 10\u201317 (2019). https:\/\/doi.org\/10.5281\/zenodo.3252963","journal-title":"Int. J. Comput. Sci. Issues"},{"doi-asserted-by":"crossref","unstructured":"Wu, D.J., Mao, C.H., Wei, T.E., Lee, H.M., Wu, K.P.: DroidMat: android malware detection through manifest and API calls tracing. In: 2012 Seventh Asia Joint Conference on Information Security, pp. 62\u201369 (2012)","key":"11_CR23","DOI":"10.1109\/AsiaJCIS.2012.18"},{"doi-asserted-by":"publisher","unstructured":"Yerima, S.Y., Sezer, S., McWilliams, G., Muttik, I.: A new android malware detection approach using Bayesian classification. In: 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), pp. 121\u2013128 (2013). https:\/\/doi.org\/10.1109\/AINA.2013.88","key":"11_CR24","DOI":"10.1109\/AINA.2013.88"}],"container-title":["Lecture Notes in Networks and Systems","International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-42519-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,26]],"date-time":"2023-08-26T21:02:54Z","timestamp":1693083774000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-42519-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031425189","9783031425196"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-42519-6_11","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"27 August 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Computational Intelligence in Security for Information Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salamanca","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisis-spain2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2023.cisisconference.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}