{"id":"https://openalex.org/W2744873155","doi":"https://doi.org/10.1007/978-3-319-65482-9_26","title":"An Android Malware Detection System Based on Behavior Comparison Analysis","display_name":"An Android Malware Detection System Based on Behavior Comparison Analysis","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2744873155","doi":"https://doi.org/10.1007/978-3-319-65482-9_26","mag":"2744873155"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-65482-9_26","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-65482-9_26","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101516220","display_name":"Jing Tao","orcid":"https://orcid.org/0009-0009-3911-4260"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jing Tao","raw_affiliation_strings":["Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi\u2019an Jiaotong University, Xi\u2019an, 710049, China","Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, 710049, China"],"affiliations":[{"raw_affiliation_string":"Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi\u2019an Jiaotong University, Xi\u2019an, 710049, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, 710049, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100456136","display_name":"Yan Zhang","orcid":"https://orcid.org/0000-0001-7117-0531"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Zhang","raw_affiliation_strings":["Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi\u2019an Jiaotong University, Xi\u2019an, 710049, China","Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, 710049, China"],"affiliations":[{"raw_affiliation_string":"Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi\u2019an Jiaotong University, Xi\u2019an, 710049, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, 710049, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101472515","display_name":"Pengfei Cao","orcid":"https://orcid.org/0000-0002-8360-4541"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pengfei Cao","raw_affiliation_strings":["Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi\u2019an Jiaotong University, Xi\u2019an, 710049, China","Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, 710049, China"],"affiliations":[{"raw_affiliation_string":"Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi\u2019an Jiaotong University, Xi\u2019an, 710049, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, 710049, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100401102","display_name":"Zheng Wang","orcid":"https://orcid.org/0000-0002-4814-1115"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheng Wang","raw_affiliation_strings":["Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi\u2019an Jiaotong University, Xi\u2019an, 710049, China","Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, 710049, China"],"affiliations":[{"raw_affiliation_string":"Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi\u2019an Jiaotong University, Xi\u2019an, 710049, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, 710049, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012427315","display_name":"Qiqi Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiqi Zhao","raw_affiliation_strings":["Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi\u2019an Jiaotong University, Xi\u2019an, 710049, China","Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, 710049, China"],"affiliations":[{"raw_affiliation_string":"Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi\u2019an Jiaotong University, Xi\u2019an, 710049, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, 710049, China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101516220"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.10423453,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"387","last_page":"396"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8595610857009888},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8352763652801514},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.8013381958007812},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7884184122085571},{"id":"https://openalex.org/keywords/system-call","display_name":"System call","score":0.5615531802177429},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.4399329721927643},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.36997973918914795},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3433045446872711},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3366129398345947},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3275721073150635},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3240584433078766},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.09130948781967163}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8595610857009888},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8352763652801514},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.8013381958007812},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7884184122085571},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.5615531802177429},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.4399329721927643},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.36997973918914795},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3433045446872711},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3366129398345947},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3275721073150635},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3240584433078766},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09130948781967163}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-65482-9_26","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-65482-9_26","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.49000000953674316,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W7103708","https://openalex.org/W23711711","https://openalex.org/W78162143","https://openalex.org/W1865564993","https://openalex.org/W1976450888","https://openalex.org/W1992181084","https://openalex.org/W2015790908","https://openalex.org/W2060692877","https://openalex.org/W2070386561","https://openalex.org/W2090534521","https://openalex.org/W2104839588","https://openalex.org/W2128212613","https://openalex.org/W2158874007","https://openalex.org/W2176830056","https://openalex.org/W2199478250","https://openalex.org/W2213145342","https://openalex.org/W6688421259"],"related_works":["https://openalex.org/W2782775281","https://openalex.org/W2439951656","https://openalex.org/W2717179875","https://openalex.org/W4249118297","https://openalex.org/W2791662519","https://openalex.org/W3036603968","https://openalex.org/W2291798086","https://openalex.org/W4385749679","https://openalex.org/W4386500498","https://openalex.org/W2765174411"],"abstract_inverted_index":null,"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
