{"id":"https://openalex.org/W2787784853","doi":"https://doi.org/10.1109/iiki.2016.56","title":"Android Malicious Application Detection Based on Ontology Technology Integrated with Permissions and System Calls","display_name":"Android Malicious Application Detection Based on Ontology Technology Integrated with Permissions and System Calls","publication_year":2016,"publication_date":"2016-10-01","ids":{"openalex":"https://openalex.org/W2787784853","doi":"https://doi.org/10.1109/iiki.2016.56","mag":"2787784853"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/iiki.2016.56","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100392722","display_name":"Da Chen","orcid":"https://orcid.org/0000-0002-2996-751X"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Da Chen","raw_affiliation_strings":["School of Information and Communication, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100771521","display_name":"Zhang Hong-mei","orcid":"https://orcid.org/0009-0006-3497-4622"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongmei Zhang","raw_affiliation_strings":["School of Information and Communication, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003811042","display_name":"Xiangli Zhang","orcid":"https://orcid.org/0000-0002-5790-1147"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangli Zhang","raw_affiliation_strings":["School of Information and Communication, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102006383","display_name":"Demin Wang","orcid":"https://orcid.org/0000-0002-3494-5147"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Demin Wang","raw_affiliation_strings":["School of Information and Communication, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":2,"citation_normalized_percentile":{"value":0.398957,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":73,"max":77},"biblio":{"volume":null,"issue":null,"first_page":"481","last_page":"484"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9953,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9915,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android-malware","display_name":"Android Malware","score":0.55808896}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8510556},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.74091244},{"id":"https://openalex.org/C25810664","wikidata":"https://www.wikidata.org/wiki/Q44325","display_name":"Ontology","level":2,"score":0.676787},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6691824},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.55808896},{"id":"https://openalex.org/C46743427","wikidata":"https://www.wikidata.org/wiki/Q1341685","display_name":"Inference engine","level":3,"score":0.5196363},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.512227},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3425812},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33281505},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1765028},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14079651},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/iiki.2016.56","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.54,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":18,"referenced_works":["https://openalex.org/W1497682552","https://openalex.org/W1562643504","https://openalex.org/W1973920970","https://openalex.org/W1984350393","https://openalex.org/W1985958467","https://openalex.org/W1990649188","https://openalex.org/W2023925542","https://openalex.org/W2037714562","https://openalex.org/W2057929437","https://openalex.org/W2083965867","https://openalex.org/W2102197271","https://openalex.org/W2133109597","https://openalex.org/W2133990480","https://openalex.org/W2145071552","https://openalex.org/W2158143121","https://openalex.org/W2291120548","https://openalex.org/W2373444683","https://openalex.org/W4301166935"],"related_works":["https://openalex.org/W4249118297","https://openalex.org/W3200508744","https://openalex.org/W3025122950","https://openalex.org/W2895504842","https://openalex.org/W2782775281","https://openalex.org/W2717179875","https://openalex.org/W2591124010","https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W2311926078"],"abstract_inverted_index":{"In":[0,38],"this":[1,50,100],"paper,":[2],"for":[3,146],"sharing":[4],"the":[5,14,117,131],"security":[6,133],"knowledge":[7,74,86],"of":[8],"smart":[9],"phone":[10],"applications":[11],"and":[12,30,46,53,56,63,77,84,95,111,151],"detecting":[13],"malicious":[15],"applications,":[16],"one":[17],"new":[18],"method":[19,106,138],"was":[20],"put":[21],"forward":[22],"based":[23,135],"on":[24,136],"ontology":[25,69,137],"technology":[26],"which":[27,60],"considered":[28],"permissions":[29,55,76],"system":[31,57,78,152],"calls":[32,58,79],"information":[33,44,59],"with":[34],"JESS":[35,97],"inference":[36,98],"engine.":[37],"order":[39],"to":[40,71],"get":[41],"final":[42],"feature":[43],"list":[45],"define":[47],"SWRL":[48,93],"rules,":[49],"paper":[51,101],"extracted":[52],"analyzed":[54],"were":[61],"significant":[62],"representative":[64],"ones.":[65],"The":[66],"constructed":[67],"application":[68,72,132],"referred":[70],"domain":[73],"including":[75],"etc.":[80],"so":[81],"that":[82,103,116,130],"explicit":[83],"tacit":[85],"could":[87,107,127],"be":[88,128],"shared.":[89],"By":[90],"selecting":[91],"defined":[92],"rules":[94],"running":[96],"engine,":[99],"demonstrated":[102],"our":[104],"detection":[105,134,144],"effectively":[108],"classify":[109],"malware":[110,143],"benign.":[112],"Experimental":[113],"results":[114],"showed":[115],"accuracy":[118],"reached":[119],"95.89%.":[120],"Moreover,":[121],"through":[122],"a":[123],"comparative":[124],"analysis,":[125],"it":[126],"seen":[129],"outperformed":[139],"two":[140,148],"existing":[141],"Android":[142],"schemes":[145],"combining":[147],"characteristic":[149],"information-permissions":[150],"calls.":[153]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2787784853","counts_by_year":[{"year":2021,"cited_by_count":2}],"updated_date":"2024-12-15T17:39:54.356207","created_date":"2018-02-23"}