dc.contributor.author | Sedano Franco, Javier | |
dc.contributor.author | Chira, Camelia | |
dc.contributor.author | González, Silvia | |
dc.contributor.author | Herrero, Álvaro | |
dc.contributor.author | Corchado, Emilio | |
dc.contributor.author | Villar Flecha, José Ramón | |
dc.date.accessioned | 2016-05-06T09:27:36Z | |
dc.date.available | 2016-05-06T09:27:36Z | |
dc.date.issued | 2015 | |
dc.identifier.citation | En: International Joint Conference : CISIS’15 and ICEUTE’15, p 167-176 (2015); doi:10.1007/978-3-319-19713-5_15 | |
dc.identifier.isbn | 9783319197128 | |
dc.identifier.isbn | 978-3-319-19713-5 | |
dc.identifier.issn | 2194-5357 | |
dc.identifier.uri | http://hdl.handle.net/10651/36795 | |
dc.description | International Conference on Computational
Intelligence in Security for Information Systems (CISIS 2015) (8th. 2015. Burgos) | |
dc.description | International Conference on EUropean Transnational Education (ICEUTE 2015) (6th. 2015.Burgos) | |
dc.format.extent | p. 167-176 | |
dc.language.iso | eng | |
dc.relation.ispartof | International Joint Conference : CISIS’15 and ICEUTE’15 | |
dc.relation.ispartofseries | Advances in Intelligent Systems and Computing;369 | |
dc.rights | ©, | |
dc.source | Scopus | |
dc.source.uri | http://www.scopus.com/inward/record.url?eid=2-s2.0-84946714300&partnerID=40&md5=2a3c2b91c7309b70009091975cb09dd3 | |
dc.title | On the selection of key features for android Malware characterization | |
dc.type | book part | spa |
dc.identifier.doi | 10.1007/978-3-319-19713-5_15 | |
dc.relation.publisherversion | http://dx.doi.org/10.1007/978-3-319-19713-5_15 | |