{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:54:55Z","timestamp":1740099295452,"version":"3.37.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030051945"},{"type":"electronic","value":"9783030051952"}],"license":[{"start":{"date-parts":[[2018,12,30]],"date-time":"2018-12-30T00:00:00Z","timestamp":1546128000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-05195-2_14","type":"book-chapter","created":{"date-parts":[[2018,12,29]],"date-time":"2018-12-29T11:53:53Z","timestamp":1546084433000},"page":"139-148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Towards an Autonomous Host-Based Intrusion Detection System for Android Mobile Devices"],"prefix":"10.1007","author":[{"given":"Jos\u00e9","family":"Ribeiro","sequence":"first","affiliation":[]},{"given":"Georgios","family":"Mantas","sequence":"additional","affiliation":[]},{"given":"Firooz B.","family":"Saghezchi","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Rodriguez","sequence":"additional","affiliation":[]},{"given":"Simon J.","family":"Shepherd","sequence":"additional","affiliation":[]},{"given":"Raed A.","family":"Abd-Alhameed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,30]]},"reference":[{"issue":"1","key":"14_CR1","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1109\/SURV.2012.013012.00028","volume":"15","author":"L Polla","year":"2013","unstructured":"Polla, L., Martinelli, F., Sgandurra, D.: A survey on security for mobile devices. IEEE Commun. Surv. Tutor. 15(1), 446\u2013471 (2013)","journal-title":"IEEE Commun. Surv. Tutor."},{"doi-asserted-by":"crossref","unstructured":"Becher, M., Freiling, F.C., Hoffmann, J., Holtz, T., Uellenbeck, S., Wolf, C.: Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices. In: Security and Privacy (SP), pp. 96\u2013111. IEEE (2011)","key":"14_CR2","DOI":"10.1109\/SP.2011.29"},{"key":"14_CR3","first-page":"207","volume-title":"Security for 5G Communications","author":"G Mantas","year":"2015","unstructured":"Mantas, G., Komninos, N., Rodriguez, J., Logota, E., Marques, H.: Security for 5G Communications, pp. 207\u2013220. Wiley, Chichester (2015)"},{"doi-asserted-by":"crossref","unstructured":"Arabo, A., Pranggono, B.: Mobile malware and smart devices security: trends, challenges and solutions. In: Control Systems and Computer (CSCS), 2013 19th International Conference, pp. 526\u2013531. IEEE (2013)","key":"14_CR4","DOI":"10.1109\/CSCS.2013.27"},{"issue":"1","key":"14_CR5","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s10844-010-0148-x","volume":"38","author":"A Shabtai","year":"2012","unstructured":"Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: \u201cAndromaly\u201d: a behavioral malware detection framework for android devices. J. Intell. Inf. Syst. 38(1), 161\u2013190 (2012)","journal-title":"J. Intell. Inf. Syst."},{"doi-asserted-by":"crossref","unstructured":"Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 15\u201326. ACM, October 2011","key":"14_CR6","DOI":"10.1145\/2046614.2046619"},{"unstructured":"Xu, R., Sa\u00efdi, H., Anderson, R.: Aurasium: practical policy enforcement for Android applications. In: Proceedings of 21st USENIX Conference on Security Symposium. USENIX Association (2012)","key":"14_CR7"},{"doi-asserted-by":"crossref","unstructured":"Borges, P., et al.: Towards a hybrid intrusion detection system for android-based PPDR terminals. In: 2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM), Lisbon, pp. 1034\u20131039 (2017)","key":"14_CR8","DOI":"10.23919\/INM.2017.7987434"},{"issue":"3","key":"14_CR9","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/s11277-010-0069-6","volume":"57","author":"N Ulltveit-Moe","year":"2011","unstructured":"Ulltveit-Moe, N., Oleshchuk, V.A., Koien, G.M.: Location-aware mobile intrusion detection with enhanced privacy in 5G context. Wireless Pers. Commun. 57(3), 317\u2013338 (2011)","journal-title":"Wireless Pers. Commun."},{"doi-asserted-by":"crossref","unstructured":"Huang, D., Zhang, X., Kang, M., Luo, J.: MobiCloud: building secure cloud framework for mobile computing and communication. In: 2010 Fifth IEEE International Symposium in Service Oriented System Engineering (SOSE), pp. 27\u201334 (2010)","key":"14_CR10","DOI":"10.1109\/SOSE.2010.20"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Broadband Communications, Networks, and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05195-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,29]],"date-time":"2018-12-29T11:58:28Z","timestamp":1546084708000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05195-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,30]]},"ISBN":["9783030051945","9783030051952"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05195-2_14","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018,12,30]]},"assertion":[{"value":"BROADNETS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Broadband Communications, Networks and Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Faro","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"broadnets2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/broadnets.org\/2018\/show\/home","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}