<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="static/style.xsl"?><OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd"><responseDate>2026-05-15T09:01:21Z</responseDate><request verb="GetRecord" identifier="oai:riubu.ubu.es:10259/7252" metadataPrefix="qdc">https://riubu.ubu.es/oai/request</request><GetRecord><record><header><identifier>oai:riubu.ubu.es:10259/7252</identifier><datestamp>2023-01-18T01:05:24Z</datestamp><setSpec>com_10259_3847</setSpec><setSpec>com_10259_5086</setSpec><setSpec>com_10259_2604</setSpec><setSpec>col_10259_3848</setSpec></header><metadata><qdc:qualifieddc xmlns:qdc="http://dspace.org/qualifieddc/" xmlns:doc="http://www.lyncode.com/xoai" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dcterms="http://purl.org/dc/terms/" xmlns:dc="http://purl.org/dc/elements/1.1/" xsi:schemaLocation="http://purl.org/dc/elements/1.1/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dc.xsd http://purl.org/dc/terms/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dcterms.xsd http://dspace.org/qualifieddc/ http://www.ukoln.ac.uk/metadata/dcmi/xmlschema/qualifieddc.xsd">
<dc:title>Gaining deep knowledge of Android malware families through dimensionality reduction techniques</dc:title>
<dc:creator>Vega Vega, Rafael Alejandro</dc:creator>
<dc:creator>Quintián, Héctor</dc:creator>
<dc:creator>Calvo-Rolle, José Luis</dc:creator>
<dc:creator>Herrero Cosío, Álvaro</dc:creator>
<dc:creator>Corchado, Emilio</dc:creator>
<dc:subject>Android malware</dc:subject>
<dc:subject>Malware families</dc:subject>
<dc:subject>Dimensionality reduction</dc:subject>
<dc:subject>Artificial neural networks</dc:subject>
<dcterms:abstract>This research proposes the analysis and subsequent characterisation of Android malware families by means of low&#xd;
dimensional visualisations using dimensional reduction techniques. The well-known Malgenome data set, coming from&#xd;
the Android Malware Genome Project, has been thoroughly analysed through the following six dimensionality reduction&#xd;
techniques: Principal Component Analysis, Maximum Likelihood Hebbian Learning, Cooperative Maximum Likelihood&#xd;
Hebbian Learning, Curvilinear Component Analysis, Isomap and Self Organizing Map. Results obtained enable a clear visual&#xd;
analysis of the structure of this high-dimensionality data set, letting us gain deep knowledge about the nature of such Android&#xd;
malware families. Interesting conclusions are obtained from the real-life data set under analysis.</dcterms:abstract>
<dcterms:dateAccepted>2023-01-17T11:47:46Z</dcterms:dateAccepted>
<dcterms:available>2023-01-17T11:47:46Z</dcterms:available>
<dcterms:created>2023-01-17T11:47:46Z</dcterms:created>
<dcterms:issued>2019-04</dcterms:issued>
<dc:type>info:eu-repo/semantics/article</dc:type>
<dc:identifier>1367-0751</dc:identifier>
<dc:identifier>http://hdl.handle.net/10259/7252</dc:identifier>
<dc:identifier>10.1093/jigpal/jzy030</dc:identifier>
<dc:identifier>1368-9894</dc:identifier>
<dc:language>eng</dc:language>
<dc:relation>Logic Journal of the IGPL. 2019, V. 27, n. 2, p. 160-176</dc:relation>
<dc:relation>https://doi.org/10.1093/jigpal/jzy030</dc:relation>
<dc:rights>info:eu-repo/semantics/openAccess</dc:rights>
<dc:publisher>Oxford University Press</dc:publisher>
</qdc:qualifieddc></metadata></record></GetRecord></OAI-PMH>