{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:23:52Z","timestamp":1730265832797,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1109\/iisa59645.2023.10345858","type":"proceedings-article","created":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T19:15:02Z","timestamp":1702667702000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Android Malware Detection in IoT Mobile Devices using a Meta-ensemble Classifier"],"prefix":"10.1109","author":[{"given":"Gregory","family":"Davrazos","sequence":"first","affiliation":[{"name":"University of Patras,Dept. of Mathematics,Patras,Greece"}]},{"given":"Theodor","family":"Panagiotakopoulos","sequence":"additional","affiliation":[{"name":"Hellenic Open University,Greece"}]},{"given":"Sotiris","family":"Kotsiantis","sequence":"additional","affiliation":[{"name":"University of Patras,Dept. of Mathematics,Patras,Greece"}]},{"given":"Achilles","family":"Kameas","sequence":"additional","affiliation":[{"name":"Hellenic Open University,Greece"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-74664-3"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IISA52424.2021.9555509"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2769493.2769529"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN51773.2022.9976168"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IISA56318.2022.9904408"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-79157-5_33"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3237970"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102794"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102833"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.01.007"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2700270"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2777960"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3033026"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/sym12050858"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102718"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/s22062268"},{"volume-title":"Android Malware Dataset for Machine Learning [Dataset]","author":"Tiwari","key":"ref18"},{"volume-title":"Pycaret: An open source, low-code machine learning library in python, PyCaret version 2.3.5","year":"2020","author":"Ali","key":"ref19"},{"issue":"1","key":"ref20","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Machine learning"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-006-6226-1"},{"journal-title":"arXiv","article-title":"CatBoost: gradient boosting with categorical features support","year":"2018","author":"Dorogush","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref24","first-page":"3146","article-title":"LightGBM: A Highly Efficient Gradient Boosting Decision Tree","volume":"30","author":"Ke","year":"2017","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/tit.1967.1053964"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1013203451"},{"first-page":"536","volume-title":"Logistic regression","year":"2002","author":"Kleinbaum","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"article-title":"Improving Regressors using Boosting Techniques","volume-title":"International Conference on Machine Learning","author":"Drucker","key":"ref30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1504\/IJAPR.2016.079050"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2014.6889396"},{"key":"ref33","first-page":"1","volume-title":"Naive Bayes classifiers","volume":"18.60","author":"Murphy","year":"2006"}],"event":{"name":"2023 14th International Conference on Information, Intelligence, Systems & Applications (IISA)","start":{"date-parts":[[2023,7,10]]},"location":"Volos, Greece","end":{"date-parts":[[2023,7,12]]}},"container-title":["2023 14th International Conference on Information, Intelligence, Systems & Applications (IISA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10345839\/10345840\/10345858.pdf?arnumber=10345858","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T00:54:13Z","timestamp":1703033653000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10345858\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/iisa59645.2023.10345858","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]}}}