{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T00:37:15Z","timestamp":1726015035254},"publisher-location":"Singapore","reference-count":46,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811360510"},{"type":"electronic","value":"9789811360527"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-6052-7_42","type":"book-chapter","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T16:04:19Z","timestamp":1552320259000},"page":"485-495","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Malwares Detection for Android and Windows System by Using Machine Learning and Data Mining"],"prefix":"10.1007","author":[{"given":"Syed Fakhar","family":"Bilal","sequence":"first","affiliation":[]},{"given":"Saba","family":"Bashir","sequence":"additional","affiliation":[]},{"given":"Farhan Hassan","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Haroon","family":"Rasheed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,12]]},"reference":[{"key":"42_CR1","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., Siemens, C.E.R.T.: DREBIN: effective and explainable detection of android malware in your pocket. In:\u00a0Ndss, vol. 14, pp. 23\u201326. (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"42_CR2","doi-asserted-by":"crossref","unstructured":"Mobile threat report 2012 q3: F-Secure Response Labs (2012)","DOI":"10.1016\/S1365-6937(12)70279-4"},{"key":"42_CR3","doi-asserted-by":"crossref","unstructured":"Enck, W., Ongtang, M., McDaniel, P.D.: On lightweight mobile phone application certification. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 235\u2013245 (2009)","DOI":"10.1145\/1653662.1653691"},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"Peng, H., et al.: Using probabilistic generative models for ranking risks of android apps. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 241\u2013252 (2012)","DOI":"10.1145\/2382196.2382224"},{"key":"42_CR5","doi-asserted-by":"crossref","unstructured":"Sarma, B.P., Li, N., Gates, C., Potharaju, R., NitaRotaru, C., Molloy, I.: Android permissions: a perspective combining risks and benefits. In: Proceedings of the ACM symposium on Access Control Models and Technologies (SACMAT), pp. 13\u201322 (2012)","DOI":"10.1145\/2295136.2295141"},{"key":"42_CR6","unstructured":"Jiang, X.: Security alert: new droidkungfu variant (2011). http:\/\/www.csc.ncsu.edu\/faculty\/jiang\/DroidKungFu3\/"},{"key":"42_CR7","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 627\u2013638 (2011)","DOI":"10.1145\/2046707.2046779"},{"key":"42_CR8","volume-title":"An Introduction to Support Vector Machines","author":"N Cristianini","year":"2000","unstructured":"Cristianini, N., Shawe-Taylor, J.: An Introduction to Support Vector Machines. Cambridge University Press, Cambridge (2000)"},{"key":"42_CR9","first-page":"1871","volume":"9","author":"R-E Fan","year":"2008","unstructured":"Fan, R.-E., Chang, K.-W., Hsieh, C.-J., Wang, X.-R., Lin, C.-J.: LIBLINEAR: a library for large linear classification. J. Mach. Learn. Res. (JMLR) 9, 1871\u20131874 (2008)","journal-title":"J. Mach. Learn. Res. (JMLR)"},{"key":"42_CR10","doi-asserted-by":"crossref","unstructured":"Bazrafshan, Z., Hashemi, H., Fard, S.M.H., Hamzeh, A.: A survey on heuristic malware detection techniques. In: 2013 5th Conference on Information and Knowledge Technology (IKT), pp. 113\u2013120. IEEE (2013)","DOI":"10.1109\/IKT.2013.6620049"},{"key":"42_CR11","volume-title":"The Art of Computer Virus Research and Defense","author":"P Szor","year":"2005","unstructured":"Szor, P.: The Art of Computer Virus Research and Defense. Addison Wesley for Symantec Press, New Jersey (2005)"},{"key":"42_CR12","unstructured":"Gutmann, P.: The Commercial Malware Industry (2007)"},{"key":"42_CR13","unstructured":"KALPA: Introduction to Malware (2011). http:\/\/securityresearch.in\/index.php\/projects\/malware_lab\/introduction-to-malware\/8\/"},{"key":"42_CR14","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/s11416-008-0086-0","volume":"4","author":"G Jacob","year":"2008","unstructured":"Jacob, G., Debar, H., Filiol, E.: Behavioral detection of malware: from a survey towards an established taxonomy. J. Comput. Virol. 4, 251\u2013266 (2008)","journal-title":"J. Comput. Virol."},{"issue":"3","key":"42_CR15","doi-asserted-by":"crossref","first-page":"283","DOI":"10.3844\/ajassp.2012.283.288","volume":"9","author":"AAE Elhadi","year":"2012","unstructured":"Elhadi, A.A.E., Maarof, M.A., Osman, A.H.: Malware detection based on hybrid signature behaviour application programming interface call graph information assurance and security research group. Am. J. Appl. Sci. 9(3), 283\u2013288 (2012). Faculty of Computer Science and Information Systems","journal-title":"Am. J. Appl. Sci."},{"key":"42_CR16","unstructured":"Orenstein, D.: Application Programming Interface (API). Quick Study: Application Programming Interface (API) (2000)"},{"key":"42_CR17","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","volume":"6","author":"SA Hofmeyr","year":"1998","unstructured":"Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. J. Comput. Secur. 6, 151\u2013180 (1998)","journal-title":"J. Comput. Secur."},{"key":"42_CR18","unstructured":"Bergeron, J., Debbabi, M., Desharnais, J., Erhioui, M.M., Lavoie, Y., Tawbi, N.: Static detection of malicious code in executable programs. Int. J. Req. Eng. (2001)"},{"key":"42_CR19","unstructured":"Sekar, R., Bendre, M., Bollineni, P., Dhurjati, D.: A fast automaton based approach for detecting anomalous program behaviors. In: IEEE Symposium on Security and Privacy (2001)"},{"key":"42_CR20","unstructured":"Sung, A.H., Xu, J., Chavez, P., Mukkamala, S.: Static analyzer of vicious executables. In: 20th Annual Computer Security Applications Conference, pp. 326\u2013334 (2004)"},{"key":"42_CR21","doi-asserted-by":"crossref","unstructured":"Ye, Y., Wang, D., Li, T., Ye, D.: IMDS: Intelligent malware detection system. In: Proceedings of the ACM International Conference on Knowledge Discovery Data Mining, pp. 1043\u20131047 (2007)","DOI":"10.1145\/1281192.1281308"},{"issue":"3","key":"42_CR22","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1109\/TSMCC.2009.2037978","volume":"40","author":"Y Ye","year":"2010","unstructured":"Ye, Y., Li, T., Jiang, Q., Wang, Y.: CIMDS: adapting postprocessing techniques of associative classification for malware detection. IEEE Trans. Syst. Man Cybern. C 40(3), 298\u2013307 (2010)","journal-title":"IEEE Trans. Syst. Man Cybern. C"},{"issue":"2","key":"42_CR23","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1504\/IJESDF.2007.016865","volume":"1","author":"D Bilar","year":"2007","unstructured":"Bilar, D.: OpCodes as predictor for malware. Int. J. Electron. Secur. Digit. Forensics 1(2), 156 (2007)","journal-title":"Int. J. Electron. Secur. Digit. Forensics"},{"key":"42_CR24","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/978-3-642-11747-3_3","volume-title":"Engineering Secure Software and System","author":"I Santos","year":"2010","unstructured":"Santos, I., Brezo, F., Nieves, J., Penya, Y.: Idea: OpCode-sequence-based malware detection. In: Massacci, F., Wallach, D., Zannone, N. (eds.) Engineering Secure Software and System. LNCS, vol. 5965, pp. 35\u201343. Springer, Heidelberg (2010)"},{"key":"42_CR25","doi-asserted-by":"crossref","first-page":"1226","DOI":"10.1109\/TPAMI.2005.159","volume":"27","author":"H Peng","year":"2005","unstructured":"Peng, H., Long, F., Ding, C.: Feature selection based on mutual information: criteria of max-dependency, max-relevance, and minredundancy. IEEE Trans. Pattern Anal. Mach. Intell. 27, 1226\u20131238 (2005)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"42_CR26","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.ins.2011.08.020","volume":"231","author":"I Santos","year":"2011","unstructured":"Santos, I., Brezo, F., Ugarte-Pedrero, X., Bringas, P.G.: OpCode sequences as representation of executables for data-mining-based unknown malware detection. Inf. Sci. 231, 64\u201382 (2011)","journal-title":"Inf. Sci."},{"key":"42_CR27","doi-asserted-by":"crossref","unstructured":"Santos, I., Laorden, C., Bringas, P.G.: Collective classification for unknown malware detection. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (2011)","DOI":"10.1007\/978-3-642-21323-6_1"},{"issue":"4","key":"42_CR28","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1049\/iet-ifs.2010.0180","volume":"5","author":"I Santos","year":"2011","unstructured":"Santos, I., Brezo, F., Sanz, B., Laorden, C., Bringas, P.G.: Using opCode sequences in single-class learning to detect unknown malware. IET Inf. Secur. 5(4), 220 (2011)","journal-title":"IET Inf. Secur."},{"key":"42_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/978-3-642-21323-6_7","volume-title":"Computational Intelligence in Security for Information Systems","author":"I Santos","year":"2011","unstructured":"Santos, I., Sanz, B., Laorden, C., Brezo, F., Bringas, P.G.: Opcode-sequence-based semi-supervised unknown malware detection. In: Herrero, \u00c1., Corchado, E. (eds.) CISIS 2011. LNCS, vol. 6694, pp. 50\u201357. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21323-6_7"},{"key":"42_CR30","doi-asserted-by":"crossref","unstructured":"Abou-assaleh, T., Cercone, N., Ke\u00df, V., Sweidan, R.: N-gram-based detection of new malicious code, no. 1 (2004)","DOI":"10.1109\/CMPSAC.2004.1342667"},{"key":"42_CR31","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/64.511768","volume":"11","author":"GJ Tesauro","year":"1996","unstructured":"Tesauro, G.J., Kephart, J.O., Sorkin, G.B.: Neural network for computer virus recognition. IEEE Expert 11, 5\u20136 (1996)","journal-title":"IEEE Expert"},{"key":"42_CR32","unstructured":"Arnold, W., Tesauro, G.: Automatically generated Win32 heuristic virus detection. In: Virus Bulletin Conference (2000)"},{"key":"42_CR33","unstructured":"Kolter, J.Z., Maloof, M.A.: Learning to detect malicious executables in the wild. In: Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2006)"},{"key":"42_CR34","first-page":"2721","volume":"7","author":"JZ Kolter","year":"2006","unstructured":"Kolter, J.Z., Maloof, M.A.: Learning to detect and classify malicious executables in the wild. J. Mach. Learn. Res. 7, 2721\u20132744 (2006)","journal-title":"J. Mach. Learn. Res."},{"issue":"4","key":"42_CR35","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/s11416-009-0122-8","volume":"5","author":"Y Elovici","year":"2009","unstructured":"Elovici, Y., Moskovitch, R., Stopel, D., Feher, C., Nissim, N., Japkowicz, N.: Unknown malcode detection and the imbalance problem. J. Comput. Virol. 5(4), 295 (2009)","journal-title":"J. Comput. Virol."},{"key":"42_CR36","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-28132-0","volume-title":"An Integrated Approach to Software Engineering","author":"P Jalote","year":"2005","unstructured":"Jalote, P.: An Integrated Approach to Software Engineering. Springer, New York (2005). https:\/\/doi.org\/10.1007\/0-387-28132-0"},{"issue":"4","key":"42_CR37","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1109\/TSE.1976.233837","volume":"2","author":"T McCabe","year":"1976","unstructured":"McCabe, T.: A complexity measure. IEEE Trans. Softw. Eng. SE 2(4), 308\u2013320 (1976)","journal-title":"IEEE Trans. Softw. Eng. SE"},{"key":"42_CR38","doi-asserted-by":"crossref","unstructured":"Tan, L.: The worst case execution time tool challenge. The External Test, Technical report (2006)","DOI":"10.1109\/ISoLA.2006.73"},{"key":"42_CR39","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/11790754_8","volume-title":"Detection of Intrusions and Malware & Vulnerability Assessment, volume 4064 of LNCS","author":"D Bruschi","year":"2006","unstructured":"Bruschi, D., Martignoni, L., Monga, M.: Detecting self-mutating malware using control-flow graph matching. In: B\u00fcschkes, R., Laskov, P. (eds.) Detection of Intrusions and Malware & Vulnerability Assessment, volume 4064 of LNCS, pp. 129\u2013143. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11790754_8"},{"key":"42_CR40","unstructured":"Zhao, Z.: A virus detection scheme based on features of control flow graph. In: 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), pp. 943\u2013 947 (2011)"},{"key":"42_CR41","first-page":"1","volume":"11","author":"M Eskandari","year":"2011","unstructured":"Eskandari, M., Hashemi, S.: Metamorphic malware detection using control flow graph mining. Int. J. Comput. Sci. Netw. Secur. 11, 1\u20136 (2011)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"issue":"2","key":"42_CR42","first-page":"57","volume":"39","author":"Y Lu","year":"2010","unstructured":"Lu, Y., Din, S., Zheng, C., Gao, B.: Using multi-feature and classifier ensembles to improve malware detection. J. CCIT 39(2), 57\u201372 (2010)","journal-title":"J. CCIT"},{"key":"42_CR43","doi-asserted-by":"crossref","unstructured":"Firdausi, I., Erwin, A., Nugroho, A.S.: Analysis of machine learning techniques used in behavior-based malware detection. In: 2010 Second International Conference on Advances in Computing, Control and Telecommunication Technologies (ACT), pp. 201\u2013203. IEEE (2010)","DOI":"10.1109\/ACT.2010.33"},{"key":"42_CR44","unstructured":"Bayer, U., Kruegel, C., Kirda, E.: TTAnalyze: a tool for analyzing malware. In: 15th Annual Conference of the European Institute for Computer Antivirus Research, Hamburg, Germany, pp. 180\u2013192 (2006)"},{"key":"42_CR45","unstructured":"Ye, Y., Li, T., Adjeroh, D., Iyengar, S.S.: A survey on malware detection using data mining techniques. ACM Comput. Surv. 50(3) (2017). Article no. 41"},{"key":"42_CR46","unstructured":"Popov, I.: Malware detection using machine learning based on Word2vec embedding of machine code instruction. 978-1-5386-1593-5\/17\/$31.00 (2017)"}],"container-title":["Communications in Computer and Information Science","Intelligent Technologies and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-6052-7_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T02:27:23Z","timestamp":1606703243000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-6052-7_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811360510","9789811360527"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-6052-7_42","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"12 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INTAP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Technologies and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bahawalpur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pakistan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"intap2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/jdconline.net\/intap\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}