{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{“日期-部分”:[[2023,6,27]],“日期-时间”:“2023-06-27T16:36:42Z”,“时间戳”:1687883802320},“发布者位置”:“查姆”,“引用-计数”:13,“出版商”:“斯普林格国际出版”,“isbn-type”:[{“值”:“9783319197128”,“类型”:”打印“},{“值”:“9783319197135”,“type”:“electronic”}],“license”:[{“start”:{“date parts”:[[2015,1,1]],“date time”:“2015-01-01T00:00:00Z”,“timestamp”:1420070400000},“content-version”:“tdm”,“delay in days”:0,“URL”:“http:\/\/wspringer.com\/tdm”},{“start”:{“date parts”:[[2015,1,1]],“date time”:“2015-01-01T00:00:00Z”,“timestamp”:1420070400000},“content-version”:“tdm”,“delay-in-days”:0,“URL”:“https:\\/www.springernature.com//gp\researters\/text-and-data-mining”},{“start”:{“date-parts”:[[2015,1,1]],“date-time”:“2015-01T00:00:00Z”,“timestamp”:1420070400000},“content-version”:“vor”,“delay-in-days“:0,”URL“https://www.sprinternature.com//gp\researders\/text-and-data-mining”“}],”内容域“:{”域“用法:[“link.springer.com”],“crossmark-restriction”:false},“short-container-title”:[],“published-print”:{“date-parts”:[[2015]]},”DOI“:”10.1007\/978-3-19713-5_33“,”type“:”book-capter“,”created“:{”date-part“:[2015,5,26]],”date-time“:”2015-05-26T13:19:45Z“,”timestamp“:1432646385000},“,”更新策略“:“http://\/dx.doi.org\/10.1007\/springer_crossmark_policy”,“source”:“Crossref”、“is-referenced-by-count”:4,“title”:[“权限作为Android恶意软件检测功能的演变”],“prefix”:“10.1007”,”author“:[{”given“:”Jos\u00e9 Gaviria“,”family“:”de la Puerta“,”sequence“:”first“,”affiliation“:[]},{”Givent“:”Borja“,”家族“:”Sanz“,”序列“:“additional”,“affiliation”:[]},{“given”:“Igor”,“family”:“Santos Grueiro”,“sequence”:“addressional”,“abfiliation“:[]{”given“:”Pablo Garc\u00eda“,”family“:”Bringas“,”sequence“:”additional“,”affiliance“:[]}],“member”:“297”,“published-on-line”:{“date-parts”:[2015,5,27]]}“,”reference“:[{”key“33_C R1“,”非结构化“:“Schultz,M.G.、Eskin,E.、Zadok,E.和Stolfo,S.J.:检测新恶意可执行文件的数据挖掘方法。摘自:2001年IEEE安全与隐私研讨会论文集,2001年标准普尔,第38\u201349页。IEEE(2001)“},{”key“:”33_CR2“,”doi-asserted-by“:”crossref“,”unstructured“:”Rieck,K.,Holz,T.,Willems,C.,D\u00fcssel,P.,Laskov,P.:恶意软件行为的学习和分类。In:入侵和恶意软件的检测,以及漏洞评估。Springer,pp.108\u2013125(2008)“,”doi“:”10.1007\/978-3-540-70542-0_6“}”,{“key”:“33_CR3”,“doi-asserted-by“:”crossref“,”unstructured“:”Tian,R.,Batten,L.,Islam,M.,Versteeg,S.:基于特洛伊木马和病毒家族字符串的自动分类系统。收录于:2009年第四届恶意软件国际会议(MALWARE),第23\u201330页。IEEE(2009)“,”DOI“:”10.1109\/MALWARE.2009.5403021“},{”key“:”33_CR4“,”DOI-asserted-by“:”crossref“,”unstructured“:”Sanz,B.,Santos,I.,Laorden,C.,Ugarte-Perdero,X.,Bringas,P.G.,\u00c1lvarez,G.:Puma:检测android中恶意软件的权限使用。参见:国际联合会议CISIS\u201912-ICEUTE\u2019 12-SOCO\u201912特别会议,第289\u2013298页。Springer(2013)“,”DOI“:”10.1007\/978-3-642-33018-6_30“},{”key“:”33_CR5“,”DOI-asserted-by“:”crossref“,”unstructured“:”Arp,D.,Spreitzenbarth,M.,H\u00fcbner,M.、Gascon,H.、Rieck,K.、Siemens,C.:Drebin:有效且可解释地检测你口袋中的android恶意软件。in:Proceedings of NDSS(2014)“,“DOI”:“10.14722\/NDSS.2014.23247”},{“key“:”33_CR6“,”unstructured“:”Bishop,C.M.等人:《模式识别和机器学习》,第4卷。Springer,New York(2006)“},{“key”:“33_CR7”,“first page”:“1137”,“volume”:“14”,“author”:“R Kohavi”,“year”:“1995”,“nonstructured”:“Kohavi,R.等人:准确性估计和模型选择的交叉验证和引导研究。IJCAI 141137\u20131145(1995)”,“journal title”:“IJCAI”},{“issue”:“2009”,“key”:“33_CR8”,doi断言为“:”publisher“,“first page”:“183”,“DOI”:“10.1504\/IJCAT.2009.026595”,“volume”:”35“,“author”:“Y Singh”,“year”:“2009”,“unstructured”:“Singh,Y.,Kaur,A.,Malhotra,R.:预测故障倾向模型的回归和机器学习方法的比较分析。国际期刊计算。申请。Technol公司。35(2009),183\u2013193(2009)“,“期刊标题”:“国际计算杂志”。申请。Technol公司。“},{”key“:”33_CR9“,”doi-asserted-by“:”publisher“,”first-page“:”5“,”doi“:”10.1023\/A:1010933404324“,”volume“:“45”,”author“:”L Breiman“,”year“:”2001“,”unstructured“:”Breiman,L.:Random forests.Mach.Learn.45,5\u201332(2001).doi:10.1023\/A:1010933404324“”,”journal title“:”Mach.Lern.“”,{“key”:“33_CR10”,“unstructured”:“Quinlan,J.:C4。5:机器学习程序。Morgan kaufmann(1993)“},{“key”:“33_CR11”,“doi-asserted-by”:“publisher”,“unstructured”:“Salzberg,S.L.:C4.5:J.Ross Quinlan编写的机器学习程序。Morgan kaufmann-Publishers,inc.,1993。机器。学习。16,235\u2013240(1994)。doi:10.1007,BF00993309“,”doi“:”10.1007,“BF00993309”},{“key”:“33_CR12”,“doi-asserted-by”:“publisher”,“unstructured”:“Jiang,L.,Wang,D.,Cai,Z.,Yan,X.:改进朴素贝叶斯分类的调查。In:Alhajj,R.,Gao,H.,Li,X.Li,J.,Za\u00efane,O.(eds.)高级数据挖掘和应用程序。计算机科学课堂讲稿,第4632卷,第134\u2013145页。Springer,Berlin,Heidelberg(2007)doi:10.1007,“978-3-540-73871-8_14”,“doi”:“10.1007”,{“key”:“33_CR13”,“unstructured”:“Platt,J.C.:序列最小优化:训练支持向量机的快速算法(1998)”}],“container-title”:[“Advances in Intelligent Systems and Computing”,“国际联席会议“],”original-title“:[],”link“:[{”URL“:”https:\/\/link.springer.com/content\/pdf\/101007\/978-3-319-19713-5_33“,”content-type“:”unspecified“,”content-version“:”vor“,”intended-application“:”similarity-checking“}],”deposed“:{”date-parts“:[2023,2,8]],”date-time“:“2023-02-08T12:10:26Z”,“timestamp”:16758226000},“score“:1,”resource“:{“primary”:{”URL“:”https:\/\/link.springer.com/10.1007\/978-3-319-19713-5_33“}},”subtitle“:[],”shorttitle“:[],”issued“:{”date-parts“:[[2015]]},“ISBN”:[“9783319197128”,“97833.19197135”],“references-count”:13,“URL”:“http://\/dx.doi.org\/10007\/978 3-319-1973”13-5_33“,”关系“:{},”ISSN“:[”2194-5357“,”2194-4365“],”ISSN-type“:[{”value“:”2194-5357“,”type“:“print”},{“value”:“2194-5365”,“type”:”electronic“}],“subject”:[],“published”:{“date-parts”:[[2015]]},“assertion”:[{“value”:“2015年5月27日”,“order”:1,“name”:“first_online”,“label”:“first online”