{"id":"https://openalex.org/W2889975722","doi":"https://doi.org/10.1007/978-3-030-00012-7_10","title":"Mass Discovery of Android Malware Behavioral Characteristics for Detection Consideration","display_name":"Mass Discovery of Android Malware Behavioral Characteristics for Detection Consideration","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2889975722","doi":"https://doi.org/10.1007/978-3-030-00012-7_10","mag":"2889975722"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-00012-7_10","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-00012-7_10","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100640053","display_name":"Xin Su","orcid":"https://orcid.org/0000-0002-1860-9004"},"institutions":[{"id":"https://openalex.org/I118612203","display_name":"Hunan Police Academy","ror":"https://ror.org/02gh10772","country_code":"CN","type":"education","lineage":["https://openalex.org/I118612203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Su","raw_affiliation_strings":["Department of Information Technology, Hunan Police Academy, Changsha, China","Hunan Provincial Key Laboratory of Network Investigational Technology, Hunan Police Academy, Changsha, China","Key Laboratory of Network Crime Investigation of Hunan Provincial Colleges, Hunan Police Academy, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Hunan Police Academy, Changsha, China","institution_ids":["https://openalex.org/I118612203"]},{"raw_affiliation_string":"Hunan Provincial Key Laboratory of Network Investigational Technology, Hunan Police Academy, Changsha, China","institution_ids":["https://openalex.org/I118612203"]},{"raw_affiliation_string":"Key Laboratory of Network Crime Investigation of Hunan Provincial Colleges, Hunan Police Academy, Changsha, China","institution_ids":["https://openalex.org/I118612203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052434363","display_name":"Weiqi Shi","orcid":"https://orcid.org/0000-0002-6413-8557"},"institutions":[{"id":"https://openalex.org/I118612203","display_name":"Hunan Police Academy","ror":"https://ror.org/02gh10772","country_code":"CN","type":"education","lineage":["https://openalex.org/I118612203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiqi Shi","raw_affiliation_strings":["Department of Information Technology, Hunan Police Academy, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Hunan Police Academy, Changsha, China","institution_ids":["https://openalex.org/I118612203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102311223","display_name":"Jiuchuan Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I1302611135","display_name":"Ministry of Public Security of the People's Republic of China","ror":"https://ror.org/00bt9we26","country_code":"CN","type":"government","lineage":["https://openalex.org/I1302611135"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiuchuan Lin","raw_affiliation_strings":["Key Lab of Information Network Security of Ministry of Public Security, The Third Research Institute of Ministry of Public Security, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Key Lab of Information Network Security of Ministry of Public Security, The Third Research Institute of Ministry of Public Security, Shanghai, China","institution_ids":["https://openalex.org/I1302611135"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101991352","display_name":"Xin Wang","orcid":"https://orcid.org/0000-0003-2659-6677"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Wang","raw_affiliation_strings":["College of Computer Science and Electronics Engineering, Hunan University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronics Engineering, Hunan University, Changsha, China","institution_ids":["https://openalex.org/I16609230"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5102311223"],"corresponding_institution_ids":["https://openalex.org/I1302611135"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15114236,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"101","last_page":"112"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.987500011920929,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8983178734779358},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.894466757774353},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.8533278107643127},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7502530217170715},{"id":"https://openalex.org/keywords/system-call","display_name":"System call","score":0.49109911918640137},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.4717120826244354},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38238781690597534},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.367360919713974},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.25388866662979126}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8983178734779358},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.894466757774353},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.8533278107643127},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7502530217170715},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.49109911918640137},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.4717120826244354},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38238781690597534},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.367360919713974},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.25388866662979126},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-00012-7_10","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-00012-7_10","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.699999988079071,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1912565424","https://openalex.org/W1988036170","https://openalex.org/W2033811191","https://openalex.org/W2087970742","https://openalex.org/W2122672392","https://openalex.org/W2125011234","https://openalex.org/W2140095007","https://openalex.org/W2166743230","https://openalex.org/W2298229910","https://openalex.org/W2324464293","https://openalex.org/W2330767629","https://openalex.org/W2399891510","https://openalex.org/W2536311873","https://openalex.org/W2551095084","https://openalex.org/W2574022511","https://openalex.org/W2591102410","https://openalex.org/W2783190965","https://openalex.org/W4244726870"],"related_works":["https://openalex.org/W2782775281","https://openalex.org/W2717179875","https://openalex.org/W4249118297","https://openalex.org/W2791662519","https://openalex.org/W3036603968","https://openalex.org/W2291798086","https://openalex.org/W4385749679","https://openalex.org/W2765174411","https://openalex.org/W4386500498","https://openalex.org/W2608570228"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
