{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:43:52Z","timestamp":1742942632390,"version":"3.40.3"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030687335"},{"type":"electronic","value":"9783030687342"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-68734-2_8","type":"book-chapter","created":{"date-parts":[[2021,2,9]],"date-time":"2021-02-09T01:14:09Z","timestamp":1612833249000},"page":"139-163","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Android Dumpsys Analysis to Indicate Driver Distraction"],"prefix":"10.1007","author":[{"given":"Lukas","family":"Bortnik","sequence":"first","affiliation":[]},{"given":"Arturs","family":"Lavrenovs","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,7]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"S30","DOI":"10.1016\/j.diin.2015.01.008","volume":"12","author":"C Lynne","year":"2015","unstructured":"Lynne, C., Graeme, G.: Investigating evidence of mobile phone usage by drivers in road traffic accidents. Digit. Invest. 12, S30\u2013S37 (2015)","journal-title":"Digit. Invest."},{"key":"8_CR2","volume-title":"Practical Mobile Forensics: A Hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platform","author":"R Tamma","year":"2018","unstructured":"Tamma, R., Skulkin, O., Mahalik, H., Bommisetty, S.: Practical Mobile Forensics: A Hands-on Guide to Mastering Mobile Forensics for the iOS, Android, and the Windows Phone Platform, 3rd edn. Pack Publishing Ltd., Birmingham (2018)","edition":"3"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.ssci.2019.01.025","volume":"119","author":"EG Mantouka","year":"2019","unstructured":"Mantouka, E.G., Barmpounakis, E.N., Vlahogianni, E.I.: Identifying driving safety profiles from smartphone data using unsupervised learning. Saf. Sci. 119, 84\u201390 (2019)","journal-title":"Saf. Sci."},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.ssci.2019.05.059","volume":"119","author":"E Papadimitriou","year":"2019","unstructured":"Papadimitriou, E., Argyropoulou, A., Tselentis, D.I., Yannis, G.: Analysis of driver behaviour through smartphone data: the case of mobile phone use while driving. Saf. Sci. 119, 91\u201397 (2019)","journal-title":"Saf. Sci."},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Mansor, H., Markantonakis, K., Akram, R.N., Mayes, K., Gurulian, I.: Log your car: the non-invasive vehicle forensics. In: 2016 IEEE Trustcom\/BigDataSE\/ISPA, pp. 974\u2013982. IEEE, Tianjin (2016)","DOI":"10.1109\/TrustCom.2016.0164"},{"issue":"7","key":"8_CR6","doi-asserted-by":"publisher","first-page":"1563","DOI":"10.3390\/s19071563","volume":"19","author":"A Khandakar","year":"2019","unstructured":"Khandakar, A., et al.: Portable system for monitoring and controlling driver behavior and the use of a mobile phone while driving. Sensors 19(7), 1563 (2019)","journal-title":"Sensors"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Khan, I., Khusro, S., Alam, I.: Smartphone distractions and its effect on driving performance using vehicular lifelog dataset. In: 2019 International Conference on Electrical, Communication, and Computer Engineering (ICECCE), pp. 1\u20136. IEEE, Swat (2019)","DOI":"10.1109\/ICECCE47252.2019.8940697"},{"issue":"2","key":"8_CR8","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1109\/TMC.2017.2724033","volume":"17","author":"H Park","year":"2018","unstructured":"Park, H., Ahn, D., Park, T., Shin, K.G.: Automatic identification of driver\u2019s smartphone exploiting common vehicle-riding actions. IEEE Trans. Mob. Comput. 17(2), 265\u2013278 (2018)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"14","key":"8_CR9","doi-asserted-by":"publisher","first-page":"3174","DOI":"10.3390\/s19143174","volume":"19","author":"R Torres","year":"2019","unstructured":"Torres, R., Ohashi, O., Pessin, G.: A machine-learning approach to distinguish passengers and drivers reading while driving. Sensors 19(14), 3174 (2019)","journal-title":"Sensors"},{"issue":"9","key":"8_CR10","doi-asserted-by":"publisher","first-page":"1426","DOI":"10.1109\/TMC.2012.92","volume":"11","author":"J Yang","year":"2012","unstructured":"Yang, J., et al.: Detecting driver phone use leveraging car speakers. IEEE Trans. Mob. Comput. 11(9), 1426\u20131440 (2012)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"8_CR11","unstructured":"Cano, T.A., Junker, D.H., M\u00e5rtensson, M., Skov, M.B., Raptis, D.: Using smartwatch inertial sensors to recognize and distinguish between car drivers and passengers. In: 10th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, AutomotiveUI 2018, pp. 74\u201384 (2018)"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Liu, L., et al.: Toward detection of unsafe driving with wearables. In: Proceedings of the 2015 Workshop on Wearable Systems and Applications, WearSys 2015, pp. 27\u201332 (2015)","DOI":"10.1145\/2753509.2753518"},{"issue":"2","key":"8_CR13","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.3390\/s100201154","volume":"10","author":"A Mannini","year":"2010","unstructured":"Mannini, A., Sabatini, A.M.: Machine learning methods for classifying human physical activity from on-body accelerometers. Sensors 10(2), 1154\u20131175 (2010)","journal-title":"Sensors"},{"issue":"4","key":"8_CR14","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.3390\/s18041036","volume":"18","author":"D-N Lu","year":"2018","unstructured":"Lu, D.-N., Nguyen, D.-N., Nguyen, T.-H., Nguyen, H.-N.: Vehicle mode and driving activity detection based on analyzing sensor data of smartphones. Sensors 18(4), 1036 (2018)","journal-title":"Sensors"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1016\/j.trf.2018.11.017","volume":"60","author":"O Oviedo-Trespalacios","year":"2019","unstructured":"Oviedo-Trespalacios, O., King, M., Vaezipour, A., Truelove, V.: Can our phones keep us safe? A content analysis of smartphone applications to prevent mobile phone distracted driving. Transp. Res. Part F: Traffic Psychol. Behav. 60, 657\u2013668 (2019)","journal-title":"Transp. Res. Part F: Traffic Psychol. Behav."},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Ferrante, A., Medvet, E., Mercaldo, F., Milosevic, J., Visaggio, C.A.: Spotting the malicious moment: characterizing malware behavior using dynamic features. In: 11th International Conference on Availability, Reliability and Security (ARES), pp. 372\u2013381. IEEE, Salzburg (2016)","DOI":"10.1109\/ARES.2016.70"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Lashkari, A.H., Kadir, A.F.A., Taheri, L., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark android malware datasets and classification. In: 2018 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20137. IEEE, Montreal (2018)","DOI":"10.1109\/CCST.2018.8585560"},{"key":"8_CR18","doi-asserted-by":"publisher","unstructured":"Trivedi N., Das M.L.: MalDetec: a non-root approach for dynamic malware detection in Android. In: Shyamasundar, R., Singh, V., Vaidya, J. (eds.) ICISS 2017. LNCS, vol. 10717, pp. 231\u2013240. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-72598-7_14","DOI":"10.1007\/978-3-319-72598-7_14"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Taheri, L., Kadir, A.F.A., Lashkari, A.H.: Extensible android malware detection and family classification using network-flows and API-calls. In: 2019 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20138. IEEE, Chennai (2019)","DOI":"10.1109\/CCST.2019.8888430"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Shoaib, M., Incel, O.D., Scolten, H., Havinga, P.: Resource consumption analysis of online activity recognition on mobile phones and smartwatches. In: 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC), pp. 1\u20136. IEEE, San Diego (2017)","DOI":"10.1109\/PCCC.2017.8280500"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"G\u00f3mez, M., Rouvoy, R., Adams, B., Seinturier, L.: Mining test repositories for automatic detection of ui performance regressions in android apps. In: 2016 IEEE\/ACM 13th Working Conference on Mining Software Repositories (MSR), pp. 13\u201324. IEEE, Austin (2016)","DOI":"10.1145\/2901739.2901747"},{"key":"8_CR22","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.procs.2019.08.028","volume":"155","author":"OE Basara","year":"2019","unstructured":"Basara, O.E., Alptekina, G., Volakaa, H.C., Isbilenb, M., Incela, O.D.: Resource usage analysis of a mobile banking application using sensor-and-touchscreen-based continuous authentication. Proc. Comput. Sci. 155, 185\u2013192 (2019)","journal-title":"Proc. Comput. Sci."},{"key":"8_CR23","unstructured":"Dumpsys. https:\/\/developer.android.com\/studio\/command-line\/dumpsys. Accessed 25 Jan 2019"},{"key":"8_CR24","unstructured":"Logcat command-line tool. https:\/\/developer.android.com\/studio\/command-line\/logcat#alternativeBuffers. Accessed 30 Dec 2018"},{"key":"8_CR25","unstructured":"Google Git Google repositories on Android. https:\/\/android.googlesource.com\/. Accessed 24 Jan 2019"},{"key":"8_CR26","unstructured":"RecentTasksInfo. https:\/\/developer.android.com\/reference\/kotlin\/android\/app\/ActivityManager.RecentTaskInfo.html. Accessed 15 Apr 2020"},{"key":"8_CR27","unstructured":"Understand Tasks and Back Stack. https:\/\/developer.android.com\/guide\/components\/activities\/tasks-and-back-stack. Accessed 15 Apr 2020"},{"key":"8_CR28","unstructured":"Intent. https:\/\/developer.android.com\/reference\/android\/content\/Intent.html. Accessed 10 Apr 2020"},{"key":"8_CR29","unstructured":"Intents and Intent Filter. https:\/\/developer.android.com\/guide\/components\/intents-filters. Accessed 10 Apr 2020"},{"key":"8_CR30","unstructured":"UsageStats. https:\/\/developer.android.com\/reference\/android\/app\/usage\/UsageStats. Accessed 17 Mar 2020"},{"key":"8_CR31","unstructured":"UsageEvents.Event. https:\/\/developer.android.com\/reference\/android\/app\/usage\/UsageEvents.Event.html. Accessed 17 Mar 2020"},{"key":"8_CR32","unstructured":"WiFiManager. https:\/\/developer.android.com\/reference\/android\/net\/wifi\/WifiManager. Accessed 02 Mar 2020"},{"key":"8_CR33","unstructured":"Google Git, Protocol.java. https:\/\/android.googlesource.com\/platform\/frameworks\/base.git\/+\/master\/core\/java\/com\/android\/internal\/util\/Protocol.java. Accessed 01 Mar 2020"},{"key":"8_CR34","unstructured":"Google Git, WifiController.java. https:\/\/android.googlesource.com\/platform\/frameworks\/base\/+\/02ba86f\/services\/java\/com\/android\/server\/wifi\/WifiController.java. Accessed 07 Mar 2020"},{"key":"8_CR35","unstructured":"Binder. https:\/\/developer.android.com\/reference\/android\/os\/Binder.html. Accessed 25 Jan 2020"},{"key":"8_CR36","unstructured":"IBinder. https:\/\/developer.android.com\/reference\/android\/os\/IBinder.html. Accessed 25 Jan 2020"},{"key":"8_CR37","unstructured":"Android_Binder. https:\/\/elinux.org\/Android_Binder. Accessed 04 May 2019"},{"key":"8_CR38","unstructured":"Google Git, BinderProxy.java. https:\/\/android.googlesource.com\/platform\/frameworks\/base\/+\/master\/core\/java\/android\/os\/BinderProxy.java. Accessed 25 July 2019"},{"key":"8_CR39","unstructured":"Google Git, CallAudioRouteStateMachine.java. https:\/\/android.googlesource.com\/platform\/packages\/services\/Telecomm\/+\/android-7.0.0_r7\/src\/com\/android\/server\/telecom\/CallAudioRouteStateMachine.java. Accessed 29 Apr 2019"},{"key":"8_CR40","unstructured":"Android source, Bluetooth and NFC. https:\/\/source.android.com\/devices\/bluetooth\/verifying_debugging. Accessed 02 May 2019"},{"key":"8_CR41","unstructured":"Configure on-device developer options. https:\/\/developer.android.com\/studio\/debug\/dev-options. Accessed 23 Jan 2019"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-68734-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T14:02:49Z","timestamp":1619272969000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-68734-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030687335","9783030687342"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-68734-2_8","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"7 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICDF2C","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Digital Forensics and Cyber Crime","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Boston, MA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icdf2c2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/d-forensics.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confyplus","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.7","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to COVID 19 pandemic teh conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}