{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:57:52Z","timestamp":1729659472989,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.23919\/icitst.2017.8356358","type":"proceedings-article","created":{"date-parts":[[2018,5,10]],"date-time":"2018-05-10T19:01:01Z","timestamp":1525978861000},"page":"111-115","source":"Crossref","is-referenced-by-count":11,"title":["Android botnet detection: An integrated source code mining approach"],"prefix":"10.23919","author":[{"given":"Basil","family":"Alothman","sequence":"first","affiliation":[]},{"given":"Prapa","family":"Rattadilok","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","volume":"11","author":"hall","year":"2009","journal-title":"The WEKA Data Mining Software An Update SIGKDD Explorations"},{"journal-title":"CodeAnalyzer","year":"0","key":"ref30"},{"journal-title":"Sourceforge","year":"2016","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1201\/b11298"},{"journal-title":"Data Mining With Decision Trees Theory and Applications (2nd Edition) (Series in Machine Perception and Artificial Intelligence) (Series in Machine Perception and Artificial Intelligence)","year":"2014","author":"rokach","key":"ref12"},{"journal-title":"Support Vector Machines (Information Science and Statistics)","year":"2008","author":"steinwart","key":"ref13"},{"journal-title":"Classification Algorithms Artificial Neural Network Naive Bayes Classifier Support Vector MacHine Boosting Linear Classifier Case-Based Reasonin","year":"2013","author":"wikipedia","key":"ref14"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1002\/9781118874059","author":"larose","year":"2014","journal-title":"Discovering Knowledge in Data an Introduction to Data Mining"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1201\/b10867"},{"journal-title":"Text Mining Predictive Methods for Analyzing Unstructured Information","year":"2009","author":"weiss","key":"ref17"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1007\/b102253","author":"liu","year":"1998","journal-title":"Feature Selection for Knowledge Discovery and Data Mining (The Springer International Series in Engineering and Computer Science)"},{"journal-title":"Computational Methods of Feature Selection (Chapman & Hall\/Crc Data Mining and Knowledge Discovery Series)","year":"2007","author":"liu","key":"ref19"},{"key":"ref28","article-title":"DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis","author":"yan","year":"2012","journal-title":"21st USENIX Security Symposium (USENIX Security 2012)"},{"key":"ref4","article-title":"Droidkin: Lightweight detection of android apps similarity","author":"gonzalez","year":"2014","journal-title":"Proceedings of the 10th SECURECOMM"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516676"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25645-0_6"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.07.106"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSA.2014.10"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen:20070110"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2016.03.002"},{"key":"ref7","first-page":"1","author":"wei","year":"2015","journal-title":"Claim What You Need A Text-Mining Approach on Android Permission Request Authorization"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.10.004"},{"journal-title":"GitHub-java-decompiler\/jd-gui A standalone Java Decompiler GUI","year":"0","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.01.008"},{"key":"ref20","first-page":"139","article-title":"BotMiner: clustering analysis of network traffic for protocol-and structure-independent botnet detection","author":"gu","year":"2008","journal-title":"Proceedings of The 17th Conference on Security Symposium"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"key":"ref21","first-page":"1","article-title":"BotHunter: detecting malware infection through IDS-driven dialog correlation","author":"gu","year":"2007","journal-title":"Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium"},{"journal-title":"Flowdroid Precise Context Flow Field Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps","year":"2014","author":"arzt","key":"ref24"},{"journal-title":"Modeling Peer-to-Peer Botnet on Scale-Free Network Abstract and Applied Analysis","year":"0","author":"feng","key":"ref23"},{"journal-title":"DroidPF A Framework for Automatic Verification of Android Applications","year":"2014","author":"bai","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/WCSE.2012.26"}],"event":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2017,12,11]]},"location":"Cambridge","end":{"date-parts":[[2017,12,14]]}},"container-title":["2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8354335\/8356324\/08356358.pdf?arnumber=8356358","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T11:15:44Z","timestamp":1693653344000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8356358\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":31,"URL":"https:\/\/doi.org\/10.23919\/icitst.2017.8356358","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}