{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:41:50Z","timestamp":1743043310434,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030118891"},{"type":"electronic","value":"9783030118907"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-11890-7_33","type":"book-chapter","created":{"date-parts":[[2019,1,28]],"date-time":"2019-01-28T10:39:57Z","timestamp":1548671997000},"page":"335-345","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Energy Consumption for Anti-virus Applications in Android OS"],"prefix":"10.1007","author":[{"given":"Elsa","family":"Vera-Burgos","sequence":"first","affiliation":[]},{"given":"Willian","family":"Zamora","sequence":"additional","affiliation":[]},{"given":"Homero","family":"Mendoza-Rodriguez","sequence":"additional","affiliation":[]},{"given":"Alex","family":"Santamar\u00eda-Philco","sequence":"additional","affiliation":[]},{"given":"Denise","family":"Vera-Navarrete","sequence":"additional","affiliation":[]},{"given":"Patricia","family":"Quiroz-Palma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,29]]},"reference":[{"key":"33_CR1","doi-asserted-by":"publisher","unstructured":"Perrucci, G.P., Fitzek, F.H., Sasso, G., Kellerer, W., Widmer, J.: On the impact of 2G and 3G network usage for mobile phones battery life. In: 2009 European Wireless Conference, pp. 255\u2013259. IEEE (2009). \nhttps:\/\/doi.org\/10.1109\/EW.2009.5357972","DOI":"10.1109\/EW.2009.5357972"},{"key":"33_CR2","unstructured":"Martins, M., Cappos, J., Fonseca, R., Martins, M., Cappos, J., Fonseca, R.: Selectively Taming Background Android Apps to Improve Battery Lifetime"},{"key":"33_CR3","unstructured":"Optimizing for Doze and App Standby. \nhttp:\/\/developer.android.com\/training\/monitoring-device-state\/doze-standby.html"},{"key":"33_CR4","doi-asserted-by":"publisher","unstructured":"Pieterse, H., Olivier, M.S.: Security steps for smartphone users, pp. 1\u20136 (2013). \nhttps:\/\/doi.org\/10.1109\/ISSA.2013.6641036","DOI":"10.1109\/ISSA.2013.6641036"},{"key":"33_CR5","unstructured":"Manet, L.E., Anne, F., Jean-yves, M., Serge, F.A.: Energy Consumption Models for Ad-Hoc Mobile Terminals"},{"key":"33_CR6","unstructured":"Estudio del consumo de energ\u00eda. In: Univeridad Carlos III de Madrid, pp. 54\u201355 (2012)"},{"issue":"3","key":"33_CR7","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1107\/S010876730200137X","volume":"58","author":"Ian Bytheway","year":"2002","unstructured":"Bytheway, I., Grimwood, D.J., Jayatilaka, D.: Wavefunctions derived from experiment. III. Topological analysis of crystal fragments., Acta crystallographica. Section A, Foundations of crystallography 58(Pt 3), pp. 232\u2013243 (2002)","journal-title":"Acta Crystallographica Section A Foundations of Crystallography"},{"key":"33_CR8","unstructured":"Malik, M.Y.: Power Consumption Analysis of a Modern Smartphone, p. 11 (2012). \narXiv:1212.1896"},{"key":"33_CR9","unstructured":"Carroll, A., Heiser, G.: An analysis of power consumption in a smartphone. In: USENIXATC 2010 Proceedings of the 2010 USENIX Conference on USENIX Annual Technical Conference, p. 21 (2010)"},{"key":"33_CR10","doi-asserted-by":"publisher","unstructured":"Datta, S.K., Bonnet, C., Nikaein, N.: Minimizing energy expenditure in smartdevices (ICT), pp. 712\u2013717 (2013). \nhttps:\/\/doi.org\/10.1109\/CICT.2013.6558187","DOI":"10.1109\/CICT.2013.6558187"},{"key":"33_CR11","doi-asserted-by":"publisher","unstructured":"Vallina-Rodriguez, N., Hui, P., Crowcroft, J., Rice, A.: Exhausting battery statistics, p. 9, February 2010. \nhttps:\/\/doi.org\/10.1145\/1851322.1851327","DOI":"10.1145\/1851322.1851327"},{"key":"33_CR12","doi-asserted-by":"publisher","unstructured":"Anand, A., Manikopoulos, C., Jones, Q., Borcea, C.: A Quantitative Analysis of Power Consumption for Location-Aware Applications on Smart Phones, pp. 1986\u20131991 (2007). \nhttps:\/\/doi.org\/10.1109\/ISIE.2007.4374912","DOI":"10.1109\/ISIE.2007.4374912"},{"key":"33_CR13","doi-asserted-by":"publisher","unstructured":"Shye, A., Scholbrock, B., Memik, G.: Into the wild, p. 168 (2009). \nhttps:\/\/doi.org\/10.1145\/1669112.1669135","DOI":"10.1145\/1669112.1669135"},{"key":"33_CR14","unstructured":"Bickford, J., Park, F., Varshavsky, A., Park, F.: Security versus Energy Tradeoffs in Host-Based Mobile Malware Detection"},{"key":"33_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","year":"2015","unstructured":"Polakis, I., Diamantaris, M., Petsas, T.: Powerslave : Analyzing the Energy Consumption of Mobile Antivirus Software, vol. 3, pp. 165\u2013184 (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-20550-2"},{"key":"33_CR16","unstructured":"Download Android Studio and SDK Tools. \nhttp:\/\/developer.android.com"},{"key":"33_CR17","doi-asserted-by":"publisher","unstructured":"Datta, S.K., Bonnet, C., Nikaein, N.: Android power management: current and future trends. In: 2012 The First IEEE Workshop on Enabling Technologies for Smartphone and Internet of Things (ETSIoT), December 2015, pp. 48\u201353. IEEE (2012). \nhttps:\/\/doi.org\/10.1109\/ETSIoT.2012.6311253","DOI":"10.1109\/ETSIoT.2012.6311253"},{"key":"33_CR18","unstructured":"AV-TEST- The Independent IT-Security Institute (2015).\nhttps:\/\/www.av-test.org\/es\/antivirus\/moviles\/android\/noviembre-2015"},{"key":"33_CR19","unstructured":"Android Developer BatteryManager. \nhttp:\/\/developer.android.com\/intl\/reference\/android\/os\/BatteryManager.html"},{"key":"33_CR20","unstructured":"R-Foundation, R project available (2015).\nhttps:\/\/www.r-project.org"}],"container-title":["Advances in Intelligent Systems and Computing","Information Technology and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-11890-7_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,28]],"date-time":"2020-05-28T17:15:18Z","timestamp":1590686118000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-11890-7_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030118891","9783030118907"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-11890-7_33","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICITS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Technology & Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Quito","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ecuador","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 February 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 February 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icits2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icits.me\/index.php?lang=en","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}