{"id":"https://openalex.org/W2901220696","doi":"https://doi.org/10.1007/978-3-030-04212-7_43","title":"Mobile Malware Detection - An Analysis of the Impact of Feature Categories","display_name":"Mobile Malware Detection - An Analysis of the Impact of Feature Categories","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2901220696","doi":"https://doi.org/10.1007/978-3-030-04212-7_43","mag":"2901220696"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-04212-7_43","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-04212-7_43","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/conference_contribution/Mobile_malware_detection_-_an_analysis_of_the_impact_of_feature_categories/13447118","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055543654","display_name":"Mahbub E Khoda","orcid":"https://orcid.org/0000-0002-3440-2564"},"institutions":[{"id":"https://openalex.org/I149672521","display_name":"Federation University","ror":"https://ror.org/05qbzwv83","country_code":"AU","type":"education","lineage":["https://openalex.org/I149672521"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Mahbub E. Khoda","raw_affiliation_strings":["Internet Commerce Security Laboratory, Federation University Australia, Ballarat, Australia"],"affiliations":[{"raw_affiliation_string":"Internet Commerce Security Laboratory, Federation University Australia, Ballarat, Australia","institution_ids":["https://openalex.org/I149672521"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013199739","display_name":"Joarder Kamruzzaman","orcid":"https://orcid.org/0000-0002-3748-0277"},"institutions":[{"id":"https://openalex.org/I149672521","display_name":"Federation University","ror":"https://ror.org/05qbzwv83","country_code":"AU","type":"education","lineage":["https://openalex.org/I149672521"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Joarder Kamruzzaman","raw_affiliation_strings":["Internet Commerce Security Laboratory, Federation University Australia, Ballarat, Australia"],"affiliations":[{"raw_affiliation_string":"Internet Commerce Security Laboratory, Federation University Australia, Ballarat, Australia","institution_ids":["https://openalex.org/I149672521"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003563704","display_name":"Iqbal Gondal","orcid":"https://orcid.org/0000-0001-7963-2446"},"institutions":[{"id":"https://openalex.org/I149672521","display_name":"Federation University","ror":"https://ror.org/05qbzwv83","country_code":"AU","type":"education","lineage":["https://openalex.org/I149672521"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Iqbal Gondal","raw_affiliation_strings":["Internet Commerce Security Laboratory, Federation University Australia, Ballarat, Australia"],"affiliations":[{"raw_affiliation_string":"Internet Commerce Security Laboratory, Federation University Australia, Ballarat, Australia","institution_ids":["https://openalex.org/I149672521"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045350428","display_name":"Tasadduq Imam","orcid":"https://orcid.org/0000-0002-8864-4155"},"institutions":[{"id":"https://openalex.org/I74899385","display_name":"Central Queensland University","ror":"https://ror.org/023q4bk22","country_code":"AU","type":"education","lineage":["https://openalex.org/I74899385"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Tasadduq Imam","raw_affiliation_strings":["CQUniversity Australia, Rockhampton, Australia"],"affiliations":[{"raw_affiliation_string":"CQUniversity Australia, Rockhampton, Australia","institution_ids":["https://openalex.org/I74899385"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5055543654"],"corresponding_institution_ids":["https://openalex.org/I149672521"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.3255,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.59332455,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"486","last_page":"498"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9829000234603882,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8784376382827759},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8571206331253052},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.6988178491592407},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6973665952682495},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5998040437698364},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5247768759727478},{"id":"https://openalex.org/keywords/margin","display_name":"Margin (machine learning)","score":0.5171910524368286},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.5065947771072388},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.4408716857433319},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.43615785241127014},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42357492446899414},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4054873585700989},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3493495583534241},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3322039842605591},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.22383037209510803},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.1540016531944275},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12323477864265442}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8784376382827759},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8571206331253052},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.6988178491592407},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6973665952682495},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5998040437698364},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5247768759727478},{"id":"https://openalex.org/C774472","wikidata":"https://www.wikidata.org/wiki/Q6760393","display_name":"Margin (machine learning)","level":2,"score":0.5171910524368286},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.5065947771072388},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.4408716857433319},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.43615785241127014},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42357492446899414},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4054873585700989},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3493495583534241},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3322039842605591},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.22383037209510803},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.1540016531944275},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12323477864265442},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.1007/978-3-030-04212-7_43","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-04212-7_43","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:acquire.cqu.edu.au:cqu:17863","is_oa":false,"landing_page_url":"http://hdl.cqu.edu.au/10018/1266200","pdf_url":null,"source":{"id":"https://openalex.org/S4306400635","display_name":"Acquire (CQUniversity)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I74899385","host_organization_name":"Central Queensland University","host_organization_lineage":["https://openalex.org/I74899385"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Khoda, ME, Kamruzzaman, J, Gondal, I, Imam, T, (2018). Mobile malware detection - an analysis of the impact of feature categories. 13-16 December 2018, Cheng, L, Leung, ACS, Ozawa, S (Eds.), 25th International Conference on Neural Information Processing (ICONIP 2018), Siem Reap, Cambodia, Springer, Cham, Switzerland, p. 486-498, http://dx.doi.org/10.1007/978-3-030-04212-7_43","raw_type":"conference"},{"id":"pmh:vital:13784","is_oa":false,"landing_page_url":"http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/168074","pdf_url":null,"source":{"id":"https://openalex.org/S4306400234","display_name":"FedUni ResearchOnline (Federation University Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210158496","host_organization_name":"Australian Federation of University Women \u2013 South Australia","host_organization_lineage":["https://openalex.org/I4210158496"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:alma61RMIT.INST:11278493110001341","is_oa":false,"landing_page_url":"http://doi.org/10.1007/978-3-030-04212-7_43","pdf_url":null,"source":{"id":"https://openalex.org/S4306402074","display_name":"RMIT Research Repository (RMIT University Library)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I82951845","host_organization_name":"RMIT University","host_organization_lineage":["https://openalex.org/I82951845"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"pmh:oai:figshare.com:article/13447118","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/Mobile_malware_detection_-_an_analysis_of_the_impact_of_feature_categories/13447118","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:figshare.com:article/27592257","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/13447118","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/Mobile_malware_detection_-_an_analysis_of_the_impact_of_feature_categories/13447118","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1982730827","https://openalex.org/W1982773740","https://openalex.org/W2026875669","https://openalex.org/W2041151434","https://openalex.org/W2044117262","https://openalex.org/W2110889728","https://openalex.org/W2122672392","https://openalex.org/W2125011234","https://openalex.org/W2125055259","https://openalex.org/W2140095007","https://openalex.org/W2166743230","https://openalex.org/W2308726246","https://openalex.org/W2318851192","https://openalex.org/W2536311873","https://openalex.org/W2551095084","https://openalex.org/W2586845402","https://openalex.org/W2598119844","https://openalex.org/W2606250847","https://openalex.org/W2622584974","https://openalex.org/W2735251792","https://openalex.org/W4242210993","https://openalex.org/W4244726870","https://openalex.org/W4256462051","https://openalex.org/W4300607852","https://openalex.org/W6633728996"],"related_works":["https://openalex.org/W2316685381","https://openalex.org/W2538622067","https://openalex.org/W2056388267","https://openalex.org/W2717179875","https://openalex.org/W4249118297","https://openalex.org/W4388923452","https://openalex.org/W2067547021","https://openalex.org/W2334842536","https://openalex.org/W2968504645","https://openalex.org/W2810666735"],"abstract_inverted_index":null,"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
