{"id":"https://openalex.org/W2753303661","doi":"https://doi.org/10.1109/malware.2017.8323954","title":"Android malware family classification based on resource consumption over time","display_name":"Android malware family classification based on resource consumption over time","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2753303661","doi":"https://doi.org/10.1109/malware.2017.8323954","mag":"2753303661"},"language":"en","primary_location":{"id":"doi:10.1109/malware.2017.8323954","is_oa":false,"landing_page_url":"https://doi.org/10.1109/malware.2017.8323954","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 12th International Conference on Malicious and Unwanted Software (MALWARE)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1709.00875","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027861740","display_name":"Luca Massarelli","orcid":"https://orcid.org/0000-0003-4330-4840"},"institutions":[{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]},{"id":"https://openalex.org/I4210166800","display_name":"Intelligence for Environment and Security (Italy)","ror":"https://ror.org/05ve3t520","country_code":"IT","type":"company","lineage":["https://openalex.org/I4210166800"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Luca Massarelli","raw_affiliation_strings":["Research Center of Cyber Intelligence and Information Security (CIS), University of Rome, Italy","Research Center of Cyber Intelligence and Information Security (CIS), Department of Computer, Control, and Management Engineering \u201cAntonio Ruberti\u201d, \u201cLa Sapienza\u201d University of Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Research Center of Cyber Intelligence and Information Security (CIS), University of Rome, Italy","institution_ids":["https://openalex.org/I4210166800"]},{"raw_affiliation_string":"Research Center of Cyber Intelligence and Information Security (CIS), Department of Computer, Control, and Management Engineering \u201cAntonio Ruberti\u201d, \u201cLa Sapienza\u201d University of Rome, Italy","institution_ids":["https://openalex.org/I861853513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089567320","display_name":"Leonardo Aniello","orcid":"https://orcid.org/0000-0003-2886-8445"},"institutions":[{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]},{"id":"https://openalex.org/I4210166800","display_name":"Intelligence for Environment and Security (Italy)","ror":"https://ror.org/05ve3t520","country_code":"IT","type":"company","lineage":["https://openalex.org/I4210166800"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Leonardo Aniello","raw_affiliation_strings":["Research Center of Cyber Intelligence and Information Security (CIS), University of Rome, Italy","Research Center of Cyber Intelligence and Information Security (CIS), Department of Computer, Control, and Management Engineering \u201cAntonio Ruberti\u201d, \u201cLa Sapienza\u201d University of Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Research Center of Cyber Intelligence and Information Security (CIS), University of Rome, Italy","institution_ids":["https://openalex.org/I4210166800"]},{"raw_affiliation_string":"Research Center of Cyber Intelligence and Information Security (CIS), Department of Computer, Control, and Management Engineering \u201cAntonio Ruberti\u201d, \u201cLa Sapienza\u201d University of Rome, Italy","institution_ids":["https://openalex.org/I861853513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077634329","display_name":"Claudio Ciccotelli","orcid":"https://orcid.org/0000-0003-4687-8241"},"institutions":[{"id":"https://openalex.org/I4210166800","display_name":"Intelligence for Environment and Security (Italy)","ror":"https://ror.org/05ve3t520","country_code":"IT","type":"company","lineage":["https://openalex.org/I4210166800"]},{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Claudio Ciccotelli","raw_affiliation_strings":["Research Center of Cyber Intelligence and Information Security (CIS), University of Rome, Italy","Research Center of Cyber Intelligence and Information Security (CIS), Department of Computer, Control, and Management Engineering \u201cAntonio Ruberti\u201d, \u201cLa Sapienza\u201d University of Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Research Center of Cyber Intelligence and Information Security (CIS), University of Rome, Italy","institution_ids":["https://openalex.org/I4210166800"]},{"raw_affiliation_string":"Research Center of Cyber Intelligence and Information Security (CIS), Department of Computer, Control, and Management Engineering \u201cAntonio Ruberti\u201d, \u201cLa Sapienza\u201d University of Rome, Italy","institution_ids":["https://openalex.org/I861853513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051841898","display_name":"Leonardo Querzoni","orcid":"https://orcid.org/0000-0002-8711-4216"},"institutions":[{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]},{"id":"https://openalex.org/I4210166800","display_name":"Intelligence for Environment and Security (Italy)","ror":"https://ror.org/05ve3t520","country_code":"IT","type":"company","lineage":["https://openalex.org/I4210166800"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Leonardo Querzoni","raw_affiliation_strings":["Research Center of Cyber Intelligence and Information Security (CIS), University of Rome, Italy","Research Center of Cyber Intelligence and Information Security (CIS), Department of Computer, Control, and Management Engineering \u201cAntonio Ruberti\u201d, \u201cLa Sapienza\u201d University of Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Research Center of Cyber Intelligence and Information Security (CIS), University of Rome, Italy","institution_ids":["https://openalex.org/I4210166800"]},{"raw_affiliation_string":"Research Center of Cyber Intelligence and Information Security (CIS), Department of Computer, Control, and Management Engineering \u201cAntonio Ruberti\u201d, \u201cLa Sapienza\u201d University of Rome, Italy","institution_ids":["https://openalex.org/I861853513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005581132","display_name":"Daniele Ucci","orcid":"https://orcid.org/0000-0002-5902-3958"},"institutions":[{"id":"https://openalex.org/I4210166800","display_name":"Intelligence for Environment and Security (Italy)","ror":"https://ror.org/05ve3t520","country_code":"IT","type":"company","lineage":["https://openalex.org/I4210166800"]},{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Daniele Ucci","raw_affiliation_strings":["Research Center of Cyber Intelligence and Information Security (CIS), University of Rome, Italy","Research Center of Cyber Intelligence and Information Security (CIS), Department of Computer, Control, and Management Engineering \u201cAntonio Ruberti\u201d, \u201cLa Sapienza\u201d University of Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Research Center of Cyber Intelligence and Information Security (CIS), University of Rome, Italy","institution_ids":["https://openalex.org/I4210166800"]},{"raw_affiliation_string":"Research Center of Cyber Intelligence and Information Security (CIS), Department of Computer, Control, and Management Engineering \u201cAntonio Ruberti\u201d, \u201cLa Sapienza\u201d University of Rome, Italy","institution_ids":["https://openalex.org/I861853513"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111427499","display_name":"Roberto Baldoni","orcid":null},"institutions":[{"id":"https://openalex.org/I4210166800","display_name":"Intelligence for Environment and Security (Italy)","ror":"https://ror.org/05ve3t520","country_code":"IT","type":"company","lineage":["https://openalex.org/I4210166800"]},{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Roberto Baldoni","raw_affiliation_strings":["Research Center of Cyber Intelligence and Information Security (CIS), University of Rome, Italy","Research Center of Cyber Intelligence and Information Security (CIS), Department of Computer, Control, and Management Engineering \u201cAntonio Ruberti\u201d, \u201cLa Sapienza\u201d University of Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Research Center of Cyber Intelligence and Information Security (CIS), University of Rome, Italy","institution_ids":["https://openalex.org/I4210166800"]},{"raw_affiliation_string":"Research Center of Cyber Intelligence and Information Security (CIS), Department of Computer, Control, and Management Engineering \u201cAntonio Ruberti\u201d, \u201cLa Sapienza\u201d University of Rome, Italy","institution_ids":["https://openalex.org/I861853513"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5027861740"],"corresponding_institution_ids":["https://openalex.org/I4210166800","https://openalex.org/I861853513"],"apc_list":null,"apc_paid":null,"fwci":0.5607,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.65908004,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"31","last_page":"38"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9700000286102295,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9060727953910828},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8054158687591553},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.750351071357727},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.6917043924331665},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.6479313373565674},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.49270299077033997},{"id":"https://openalex.org/keywords/system-call","display_name":"System call","score":0.46085113286972046},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.4451177716255188},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4201241731643677},{"id":"https://openalex.org/keywords/resource-consumption","display_name":"Resource consumption","score":0.4186377227306366},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3646105229854584},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36223965883255005},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3389360308647156},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.26722025871276855}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9060727953910828},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8054158687591553},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.750351071357727},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.6917043924331665},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.6479313373565674},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.49270299077033997},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.46085113286972046},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.4451177716255188},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4201241731643677},{"id":"https://openalex.org/C2777480716","wikidata":"https://www.wikidata.org/wiki/Q23582796","display_name":"Resource consumption","level":2,"score":0.4186377227306366},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3646105229854584},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36223965883255005},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3389360308647156},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.26722025871276855},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":7,"locations":[{"id":"doi:10.1109/malware.2017.8323954","is_oa":false,"landing_page_url":"https://doi.org/10.1109/malware.2017.8323954","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 12th International Conference on Malicious and Unwanted Software (MALWARE)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1709.00875","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1709.00875","pdf_url":"https://arxiv.org/pdf/1709.00875","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"mag:2753303661","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/1709.00875.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"pmh:oai:eprints.soton.ac.uk:450638","is_oa":false,"landing_page_url":"https://eprints.soton.ac.uk/450638/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401019","display_name":"ePrints Soton (University of Southampton)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I43439940","host_organization_name":"University of Southampton","host_organization_lineage":["https://openalex.org/I43439940"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"},{"id":"pmh:oai:iris.uniroma1.it:11573/1017452","is_oa":false,"landing_page_url":"http://hdl.handle.net/11573/1017452","pdf_url":null,"source":{"id":"https://openalex.org/S4377196107","display_name":"IRIS Research product catalog (Sapienza University of Rome)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"},{"id":"pmh:oai:iris.uniroma1.it:11573/1160258","is_oa":false,"landing_page_url":"http://hdl.handle.net/11573/1160258","pdf_url":null,"source":{"id":"https://openalex.org/S4377196107","display_name":"IRIS Research product catalog (Sapienza University of Rome)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"},{"id":"doi:10.48550/arxiv.1709.00875","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1709.00875","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1709.00875","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1709.00875","pdf_url":"https://arxiv.org/pdf/1709.00875","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"score":0.6000000238418579,"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth"}],"awards":[{"id":"https://openalex.org/G3164523449","display_name":null,"funder_award_id":"EP/R007268/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320307791","display_name":"Cisco Systems","ror":"https://ror.org/03yt1ez60"},{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2753303661.pdf","grobid_xml":"https://content.openalex.org/works/W2753303661.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W2016346537","https://openalex.org/W2017821362","https://openalex.org/W2036887984","https://openalex.org/W2099111195","https://openalex.org/W2101234009","https://openalex.org/W2108700604","https://openalex.org/W2118000750","https://openalex.org/W2119479037","https://openalex.org/W2122672392","https://openalex.org/W2199478250","https://openalex.org/W2311926078","https://openalex.org/W2401896535","https://openalex.org/W2487124337","https://openalex.org/W2528679397","https://openalex.org/W2560992163","https://openalex.org/W2575599800","https://openalex.org/W2594215738","https://openalex.org/W2603160474","https://openalex.org/W2620844046","https://openalex.org/W3099514962","https://openalex.org/W6677733702","https://openalex.org/W6712825693","https://openalex.org/W7066667914"],"related_works":["https://openalex.org/W2963003683","https://openalex.org/W3034468725","https://openalex.org/W3120033957","https://openalex.org/W3126232258","https://openalex.org/W2620844046","https://openalex.org/W2594215738","https://openalex.org/W3092130749","https://openalex.org/W3132284896","https://openalex.org/W3181226914","https://openalex.org/W3198366832","https://openalex.org/W3017679144","https://openalex.org/W3094190102","https://openalex.org/W2900842357","https://openalex.org/W3045322569","https://openalex.org/W3159337037","https://openalex.org/W3164409774","https://openalex.org/W2765820957","https://openalex.org/W2461379474","https://openalex.org/W2186069231","https://openalex.org/W2895832160"],"abstract_inverted_index":{"The":[0,126],"vast":[1],"majority":[2],"of":[3,27,33,53,71,196,208,223],"today's":[4],"mobile":[5,134],"malware":[6,18,28,34,40,55,80,135,175,184],"targets":[7],"Android":[8,17,79,117],"devices.":[9,125],"This":[10],"has":[11,62],"pushed":[12],"the":[13,21,31,54,69,74,113,138,155,187,213,221],"research":[14],"effort":[15],"in":[16,20],"analysis":[19,29,41,61,87,165],"last":[22],"years.":[23],"An":[24],"important":[25],"task":[26],"is":[30,42,88,96,128,171],"classification":[32,82,194],"samples":[35,185],"into":[36,176],"known":[37,43],"families.":[38,177],"Static":[39],"to":[44,92,98,112,173,206,219],"fall":[45],"short":[46],"against":[47,65],"techniques":[48],"that":[49,199,207],"change":[50],"static":[51],"characteristics":[52],"(e.g.":[56],"code":[57],"obfuscation),":[58],"while":[59],"dynamic":[60,86],"proven":[63],"effective":[64],"such":[66],"techniques.":[67],"To":[68],"best":[70],"our":[72,94,200,224],"knowledge,":[73],"most":[75],"notable":[76],"work":[77],"on":[78,85,149,183],"family":[81],"purely":[83],"based":[84],"DroidScribe.":[89,209],"With":[90],"respect":[91],"DroidScribe,":[93],"approach":[95,147],"easier":[97],"reproduce.":[99],"Our":[100,146],"methodology":[101,201],"only":[102],"employs":[103],"publicly":[104,217],"available":[105,153],"tools,":[106],"does":[107],"not":[108],"require":[109],"any":[110],"modification":[111],"emulated":[114,139],"environment":[115,140],"or":[116],"OS,":[118],"and":[119,141,166],"can":[120,136],"collect":[121],"data":[122],"from":[123,154,186],"physical":[124],"latter":[127],"a":[129,169,193],"key":[130],"factor,":[131],"since":[132],"modern":[133],"detect":[137],"hide":[142],"their":[143],"malicious":[144],"behaviour.":[145],"relies":[148],"resource":[150],"consumption":[151],"metrics":[152],"proc":[156],"file":[157],"system.":[158],"Features":[159],"are":[160],"extracted":[161],"through":[162],"detrended":[163],"fluctuation":[164],"correlation.":[167],"Finally,":[168],"SVM":[170],"employed":[172],"classify":[174],"We":[178],"provide":[179],"an":[180,203],"experimental":[181],"evaluation":[182],"Drebin":[188],"dataset,":[189],"where":[190],"we":[191,211,215],"obtain":[192],"accuracy":[195,204],"82%c,":[197],"proving":[198],"achieves":[202],"comparable":[205],"Furthermore,":[210],"make":[212],"software":[214],"developed":[216],"available,":[218],"ease":[220],"reproducibility":[222],"results.":[225]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
