Changes
On December 16, 2024 at 10:49:56 PM UTC, admin:
-
Changed value of field
doi_status
toTrue
in Android Malware Category and Family Detection and Identification using Machine Learning -
Changed value of field
doi_date_published
to2024-12-16
in Android Malware Category and Family Detection and Identification using Machine Learning -
Added resource Original Metadata to Android Malware Category and Family Detection and Identification using Machine Learning
f | 1 | { | f | 1 | { |
2 | "access_rights": "", | 2 | "access_rights": "", | ||
3 | "author": "Ahmed Hashem El Fiky", | 3 | "author": "Ahmed Hashem El Fiky", | ||
4 | "author_email": "", | 4 | "author_email": "", | ||
5 | "citation": [], | 5 | "citation": [], | ||
6 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | 6 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | ||
7 | "defined_in": "https://doi.org/10.48550/arXiv.2107.01927", | 7 | "defined_in": "https://doi.org/10.48550/arXiv.2107.01927", | ||
8 | "doi": "10.57702/8n3pify8", | 8 | "doi": "10.57702/8n3pify8", | ||
n | 9 | "doi_date_published": null, | n | 9 | "doi_date_published": "2024-12-16", |
10 | "doi_publisher": "TIB", | 10 | "doi_publisher": "TIB", | ||
n | 11 | "doi_status": false, | n | 11 | "doi_status": true, |
12 | "domain": "https://service.tib.eu/ldmservice", | 12 | "domain": "https://service.tib.eu/ldmservice", | ||
13 | "extra_authors": [ | 13 | "extra_authors": [ | ||
14 | { | 14 | { | ||
15 | "extra_author": "Ayman El Shenawy", | 15 | "extra_author": "Ayman El Shenawy", | ||
16 | "orcid": "" | 16 | "orcid": "" | ||
17 | }, | 17 | }, | ||
18 | { | 18 | { | ||
19 | "extra_author": "Mohamed Ashraf Madkour", | 19 | "extra_author": "Mohamed Ashraf Madkour", | ||
20 | "orcid": "" | 20 | "orcid": "" | ||
21 | } | 21 | } | ||
22 | ], | 22 | ], | ||
23 | "groups": [ | 23 | "groups": [ | ||
24 | { | 24 | { | ||
25 | "description": "", | 25 | "description": "", | ||
26 | "display_name": "Android Malware Detection", | 26 | "display_name": "Android Malware Detection", | ||
27 | "id": "0b481946-4322-4129-a007-4a6d4fd203e0", | 27 | "id": "0b481946-4322-4129-a007-4a6d4fd203e0", | ||
28 | "image_display_url": "", | 28 | "image_display_url": "", | ||
29 | "name": "android-malware-detection", | 29 | "name": "android-malware-detection", | ||
30 | "title": "Android Malware Detection" | 30 | "title": "Android Malware Detection" | ||
31 | }, | 31 | }, | ||
32 | { | 32 | { | ||
33 | "description": "", | 33 | "description": "", | ||
34 | "display_name": "Machine Learning", | 34 | "display_name": "Machine Learning", | ||
35 | "id": "1d8623c9-adbd-4f91-be1e-53847c4ac32a", | 35 | "id": "1d8623c9-adbd-4f91-be1e-53847c4ac32a", | ||
36 | "image_display_url": "", | 36 | "image_display_url": "", | ||
37 | "name": "machine-learning", | 37 | "name": "machine-learning", | ||
38 | "title": "Machine Learning" | 38 | "title": "Machine Learning" | ||
39 | } | 39 | } | ||
40 | ], | 40 | ], | ||
41 | "id": "de48d991-49b2-4582-9773-a41afc25e81f", | 41 | "id": "de48d991-49b2-4582-9773-a41afc25e81f", | ||
42 | "isopen": false, | 42 | "isopen": false, | ||
43 | "landing_page": "https://doi.org/10.1109/ACCESS.2020.2969113", | 43 | "landing_page": "https://doi.org/10.1109/ACCESS.2020.2969113", | ||
44 | "license_title": null, | 44 | "license_title": null, | ||
45 | "link_orkg": "", | 45 | "link_orkg": "", | ||
46 | "metadata_created": "2024-12-16T22:49:54.966969", | 46 | "metadata_created": "2024-12-16T22:49:54.966969", | ||
n | 47 | "metadata_modified": "2024-12-16T22:49:54.966974", | n | 47 | "metadata_modified": "2024-12-16T22:49:55.502151", |
48 | "name": | 48 | "name": | ||
49 | egory-and-family-detection-and-identification-using-machine-learning", | 49 | egory-and-family-detection-and-identification-using-machine-learning", | ||
50 | "notes": "Android malware is one of the most dangerous threats on | 50 | "notes": "Android malware is one of the most dangerous threats on | ||
51 | the internet, and its prevalence has increased dramatically in recent | 51 | the internet, and its prevalence has increased dramatically in recent | ||
52 | years. Experts in cybersecurity face an open problem. There are a | 52 | years. Experts in cybersecurity face an open problem. There are a | ||
53 | variety of machine learning-based approaches for detecting and | 53 | variety of machine learning-based approaches for detecting and | ||
54 | classifying Android malware. This article offers a Machine Learning | 54 | classifying Android malware. This article offers a Machine Learning | ||
55 | Model that uses feature selection and a Machine Learning Classifier to | 55 | Model that uses feature selection and a Machine Learning Classifier to | ||
56 | successfully perform malware classification and characterization | 56 | successfully perform malware classification and characterization | ||
57 | techniques.", | 57 | techniques.", | ||
n | 58 | "num_resources": 0, | n | 58 | "num_resources": 1, |
59 | "num_tags": 4, | 59 | "num_tags": 4, | ||
60 | "organization": { | 60 | "organization": { | ||
61 | "approval_status": "approved", | 61 | "approval_status": "approved", | ||
62 | "created": "2024-11-25T12:11:38.292601", | 62 | "created": "2024-11-25T12:11:38.292601", | ||
63 | "description": "", | 63 | "description": "", | ||
64 | "id": "079d46db-32df-4b48-91f3-0a8bc8f69559", | 64 | "id": "079d46db-32df-4b48-91f3-0a8bc8f69559", | ||
65 | "image_url": "", | 65 | "image_url": "", | ||
66 | "is_organization": true, | 66 | "is_organization": true, | ||
67 | "name": "no-organization", | 67 | "name": "no-organization", | ||
68 | "state": "active", | 68 | "state": "active", | ||
69 | "title": "No Organization", | 69 | "title": "No Organization", | ||
70 | "type": "organization" | 70 | "type": "organization" | ||
71 | }, | 71 | }, | ||
72 | "owner_org": "079d46db-32df-4b48-91f3-0a8bc8f69559", | 72 | "owner_org": "079d46db-32df-4b48-91f3-0a8bc8f69559", | ||
73 | "private": false, | 73 | "private": false, | ||
74 | "relationships_as_object": [], | 74 | "relationships_as_object": [], | ||
75 | "relationships_as_subject": [], | 75 | "relationships_as_subject": [], | ||
t | 76 | "resources": [], | t | 76 | "resources": [ |
77 | { | ||||
78 | "cache_last_updated": null, | ||||
79 | "cache_url": null, | ||||
80 | "created": "2024-12-16T23:37:08", | ||||
81 | "data": [ | ||||
82 | "dcterms:title", | ||||
83 | "dcterms:accessRights", | ||||
84 | "dcterms:creator", | ||||
85 | "dcterms:description", | ||||
86 | "dcterms:issued", | ||||
87 | "dcterms:language", | ||||
88 | "dcterms:identifier", | ||||
89 | "dcat:theme", | ||||
90 | "dcterms:type", | ||||
91 | "dcat:keyword", | ||||
92 | "dcat:landingPage", | ||||
93 | "dcterms:hasVersion", | ||||
94 | "dcterms:format", | ||||
95 | "mls:task", | ||||
96 | "datacite:isDescribedBy" | ||||
97 | ], | ||||
98 | "description": "The json representation of the dataset with its | ||||
99 | distributions based on DCAT.", | ||||
100 | "format": "JSON", | ||||
101 | "hash": "", | ||||
102 | "id": "850b1095-cb3e-4bfb-9c3d-188c341a2f0e", | ||||
103 | "last_modified": "2024-12-16T22:49:55.494313", | ||||
104 | "metadata_modified": "2024-12-16T22:49:55.505109", | ||||
105 | "mimetype": "application/json", | ||||
106 | "mimetype_inner": null, | ||||
107 | "name": "Original Metadata", | ||||
108 | "package_id": "de48d991-49b2-4582-9773-a41afc25e81f", | ||||
109 | "position": 0, | ||||
110 | "resource_type": null, | ||||
111 | "size": 1285, | ||||
112 | "state": "active", | ||||
113 | "url": | ||||
114 | resource/850b1095-cb3e-4bfb-9c3d-188c341a2f0e/download/metadata.json", | ||||
115 | "url_type": "upload" | ||||
116 | } | ||||
117 | ], | ||||
77 | "services_used_list": "", | 118 | "services_used_list": "", | ||
78 | "state": "active", | 119 | "state": "active", | ||
79 | "tags": [ | 120 | "tags": [ | ||
80 | { | 121 | { | ||
81 | "display_name": "Android Malware", | 122 | "display_name": "Android Malware", | ||
82 | "id": "faef4f33-4ba4-4f0c-ad46-db39227cbb0f", | 123 | "id": "faef4f33-4ba4-4f0c-ad46-db39227cbb0f", | ||
83 | "name": "Android Malware", | 124 | "name": "Android Malware", | ||
84 | "state": "active", | 125 | "state": "active", | ||
85 | "vocabulary_id": null | 126 | "vocabulary_id": null | ||
86 | }, | 127 | }, | ||
87 | { | 128 | { | ||
88 | "display_name": "Machine Learning", | 129 | "display_name": "Machine Learning", | ||
89 | "id": "c4f3defc-ca48-45a9-9217-ce35bd3ed73c", | 130 | "id": "c4f3defc-ca48-45a9-9217-ce35bd3ed73c", | ||
90 | "name": "Machine Learning", | 131 | "name": "Machine Learning", | ||
91 | "state": "active", | 132 | "state": "active", | ||
92 | "vocabulary_id": null | 133 | "vocabulary_id": null | ||
93 | }, | 134 | }, | ||
94 | { | 135 | { | ||
95 | "display_name": "Malware Classification", | 136 | "display_name": "Malware Classification", | ||
96 | "id": "02148b5d-afaf-45ff-a2e1-a22903e41b30", | 137 | "id": "02148b5d-afaf-45ff-a2e1-a22903e41b30", | ||
97 | "name": "Malware Classification", | 138 | "name": "Malware Classification", | ||
98 | "state": "active", | 139 | "state": "active", | ||
99 | "vocabulary_id": null | 140 | "vocabulary_id": null | ||
100 | }, | 141 | }, | ||
101 | { | 142 | { | ||
102 | "display_name": "Malware Detection", | 143 | "display_name": "Malware Detection", | ||
103 | "id": "45b98307-2f4b-4829-8450-81c8e759c75c", | 144 | "id": "45b98307-2f4b-4829-8450-81c8e759c75c", | ||
104 | "name": "Malware Detection", | 145 | "name": "Malware Detection", | ||
105 | "state": "active", | 146 | "state": "active", | ||
106 | "vocabulary_id": null | 147 | "vocabulary_id": null | ||
107 | } | 148 | } | ||
108 | ], | 149 | ], | ||
109 | "title": "Android Malware Category and Family Detection and | 150 | "title": "Android Malware Category and Family Detection and | ||
110 | Identification using Machine Learning", | 151 | Identification using Machine Learning", | ||
111 | "type": "dataset", | 152 | "type": "dataset", | ||
112 | "version": "" | 153 | "version": "" | ||
113 | } | 154 | } |