{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:54:48Z","timestamp":1729630488701,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1109\/ccnc.2016.7444874","type":"proceedings-article","created":{"date-parts":[[2016,3,31]],"date-time":"2016-03-31T17:13:05Z","timestamp":1459444385000},"page":"759-764","source":"Crossref","is-referenced-by-count":8,"title":["What does the memory say? Towards the most indicative features for efficient malware detection"],"prefix":"10.1109","author":[{"given":"Jelena","family":"Milosevic","sequence":"first","affiliation":[]},{"given":"Alberto","family":"Ferrante","sequence":"additional","affiliation":[]},{"given":"Miroslaw","family":"Malek","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2015","key":"ref31","article-title":"UI\/Application Exerciser Monkey"},{"year":"2015","key":"ref30","article-title":"Android Debug Bridge"},{"key":"ref10","first-page":"6:1","article-title":"A Survey on Automated Dynamic Malware-analysis Techniques and Tools","volume":"44","author":"egele","year":"2008","journal-title":"ACM Comput Surv"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"ref14","first-page":"7","article-title":"The effectiveness of application permissions","author":"felt","year":"2011","journal-title":"Proceedings of the 2nd USENIX Conference on Web Application Development (WebApps)"},{"key":"ref15","article-title":"The Company You Keep: Mobile Malware Infection Rates and Inexpensive Risk Indicators","author":"truong","year":"2013","journal-title":"CoRR"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.29"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04342-0_13"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2012.6339233"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.32"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1854099.1854152"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2012.149"},{"journal-title":"Cisco Tech Rep","article-title":"Cisco 2014 Annual Security Report","year":"2014","key":"ref3"},{"journal-title":"Mobile Malware Attacks and Defense","year":"2008","author":"dunham","key":"ref6"},{"year":"2015","key":"ref29","article-title":"Android Software Development Kit"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"article-title":"Smart-phone attacks and defenses","year":"2007","author":"guo","key":"ref8"},{"key":"ref7","first-page":"1468","article-title":"Emerging security threats for mobile platforms","author":"delac","year":"2011","journal-title":"MIPRO 34th International Convention IEEE"},{"journal-title":"McAfee Labs Tech Rep","article-title":"2014 Threats Predictions","year":"2014","key":"ref2"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1109\/SURV.2012.013012.00028","article-title":"A Survey on Security for Mobile Devices","volume":"15","author":"la","year":"2013","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"ref1","article-title":"Threats Report","author":"labs","year":"2015","journal-title":"McAfee Labs Tech Rep"},{"key":"ref20","article-title":"Management of the security in smart secure devices","author":"robisson","year":"2011","journal-title":"Smart Systems Integration (SSI) Conference"},{"key":"ref22","first-page":"490","article-title":"Analysis of android malware detection performance using machine learning classifiers","author":"ham","year":"2013","journal-title":"ICT Convergence (ICTC) 2013 International Conference on"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0148-x"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.66"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_11"},{"key":"ref25","article-title":"A tutorial on principal component analysis","author":"shlens","year":"2005","journal-title":"Systems Neurobiology Laboratory Salk Institute for Biological Studies"}],"event":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","start":{"date-parts":[[2016,1,9]]},"location":"Las Vegas, NV","end":{"date-parts":[[2016,1,12]]}},"container-title":["2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7435634\/7440162\/07444874.pdf?arnumber=7444874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T05:45:54Z","timestamp":1498283154000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7444874\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2016.7444874","relation":{},"subject":[],"published":{"date-parts":[[2016,1]]}}}