{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:21:22Z","timestamp":1742998882575,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031087509"},{"type":"electronic","value":"9783031087516"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-08751-6_25","type":"book-chapter","created":{"date-parts":[[2022,6,21]],"date-time":"2022-06-21T06:03:15Z","timestamp":1655791395000},"page":"345-359","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DITA-NCG: Detecting Information Theft Attack Based on\u00a0Node Communication Graph"],"prefix":"10.1007","author":[{"given":"Zhenyu","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Xiaochun","family":"Yun","sequence":"additional","affiliation":[]},{"given":"Shuhao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jinbu","family":"Geng","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Li","family":"Fan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,15]]},"reference":[{"key":"25_CR1","unstructured":"App market of yingyongbao. https:\/\/android.myapp.com\/ (2021)"},{"key":"25_CR2","unstructured":"Virusshare. https:\/\/virusshare.com\/ (2021)"},{"key":"25_CR3","unstructured":"Virustotal. https:\/\/www.virustotal.com\/ (2021)"},{"key":"25_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.107026","volume":"167","author":"S Alam","year":"2020","unstructured":"Alam, S., Alharbi, S.A., Yildirim, S.: Mining nested flow of dominant APIs for detecting android malware. Comput. Netw. 167, 107026 (2020)","journal-title":"Comput. Netw."},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Arzt, S., et al.: Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. ACM Sigplan Notices 49(6), 259\u2013269 (2014)","DOI":"10.1145\/2666356.2594299"},{"issue":"1","key":"25_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1140\/epjds\/s13688-015-0046-0","volume":"4","author":"VD Blondel","year":"2015","unstructured":"Blondel, V.D., Decuyper, A., Krings, G.: A survey of results on mobile phone datasets analysis. EPJ Data Sci. 4(1), 1\u201355 (2015). https:\/\/doi.org\/10.1140\/epjds\/s13688-015-0046-0","journal-title":"EPJ Data Sci."},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Bogomolov, A., Lepri, B., Staiano, J., Oliver, N., Pianesi, F., Pentland, A.: Once upon a crime: towards crime prediction from demographics and mobile data. In: Proceedings of the 16th International Conference on Multimodal Interaction, pp. 427\u2013434. ACM (2014)","DOI":"10.1145\/2663204.2663254"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Cheng, Z., Chen, X., Zhang, Y., Li, S., Sang, Y.: Detecting information theft based on mobile network flows for android users. In: 2017 International Conference on Networking, Architecture, and Storage (NAS), pp. 1\u201310. IEEE (2017)","DOI":"10.1109\/NAS.2017.8026853"},{"key":"25_CR9","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-030-12981-1_23","volume-title":"Collaborative Computing: Networking, Applications and Worksharing","author":"Z Cheng","year":"2019","unstructured":"Cheng, Z., Chen, X., Zhang, Y., Li, S., Xu, J.: MUI-defender: CNN-Driven, network flow-based information theft detection for mobile users. In: Gao, H., Wang, X., Yin, Y., Iqbal, M. (eds.) CollaborateCom 2018. LNICST, vol. 268, pp. 329\u2013345. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-12981-1_23"},{"issue":"1","key":"25_CR10","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/TIFS.2015.2478741","volume":"11","author":"M Conti","year":"2016","unstructured":"Conti, M., Mancini, L.V., Spolaor, R., Verde, N.V.: Analyzing android encrypted network traffic to identify user actions. IEEE Trans. Inf. Forensics Secur. 11(1), 114\u2013125 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"25_CR11","doi-asserted-by":"publisher","first-page":"1376","DOI":"10.1038\/srep01376","volume":"3","author":"YA De Montjoye","year":"2013","unstructured":"De Montjoye, Y.A., Hidalgo, C.A., Verleysen, M., Blondel, V.D.: Unique in the crowd: the privacy bounds of human mobility. Sci. Rep. 3, 1376 (2013)","journal-title":"Sci. Rep."},{"key":"25_CR12","unstructured":"Desnos, A., et al.: Androguard: Reverse engineering, malware and goodware analysis of android applications. https:\/\/code.google.com\/p\/androguard\/153 (2013)"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Enck, W., et al.: TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones. Commun. ACM 57(3), 99\u2013106 (2014)","DOI":"10.1145\/2494522"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Horak, R.: Telecommunications and Data Communications Handbook. Wiley (2007). https:\/\/books.google.com\/books?id=dO2wCCB7w9sC","DOI":"10.1002\/9780470127247"},{"key":"25_CR15","unstructured":"N,B.: Fakespy - android information stealing malware attack to steal text messages, call records & contacts. https:\/\/gbhackers.com\/fakespy\/ (2019)"},{"key":"25_CR16","unstructured":"Petersen, J.: The Telecommunications Illustrated Dictionary. CRC Press advanced and emerging communications technologies series, CRC Press (2002). https:\/\/books.google.com\/books?id=b2mMzS0hCkAC"},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"Peterson, K.: Business Telecom Systems: A Guide to Choosing the Best Technologies and Services. Taylor & Francis (2000). https:\/\/books.google.com\/books?id=W79R0niNU5wC","DOI":"10.1201\/9781482294569-13"},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Ratti, C., Sobolevsky, S., Calabrese, F., Andris, C., Reades, J., Martino, M., Claxton, R., Strogatz, S.H.: Redrawing the map of great Britain from a network of human interactions. PLoS ONE 5(12), e14248 (2010)","DOI":"10.1371\/journal.pone.0014248"},{"key":"25_CR19","unstructured":"Ren, J., Rao, A., Lindorfer, M., Legout, A., Choffnes, D.: ReCon: revealing and controlling PII leaks in mobile network traffic. In: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, pp. 361\u2013374. ACM (2016)"},{"issue":"6","key":"25_CR20","doi-asserted-by":"publisher","first-page":"192","DOI":"10.3390\/info10060192","volume":"10","author":"K Sultan","year":"2019","unstructured":"Sultan, K., Ali, H., Ahmad, A., Zhang, Z.: Call details record analysis: a spatiotemporal exploration toward mobile traffic classification and optimization. Information 10(6), 192 (2019)","journal-title":"Information"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Taylor, V.F., Spolaor, R., Conti, M., Martinovic, I.: AppScanner: automatic fingerprinting of smartphone apps from encrypted network traffic. In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 439\u2013454. IEEE (2016)","DOI":"10.1109\/EuroSP.2016.40"},{"issue":"5","key":"25_CR22","doi-asserted-by":"publisher","first-page":"1096","DOI":"10.1109\/TIFS.2017.2771228","volume":"13","author":"S Wang","year":"2017","unstructured":"Wang, S., Yan, Q., Chen, Z., Yang, B., Zhao, C., Conti, M.: Detecting android malware leveraging text semantics of network flows. IEEE Trans. Inf. Forensics Secur. 13(5), 1096\u20131109 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"25_CR23","unstructured":"Wu, L.: First kotlin-developed malicious app signs users up for premium sms services. http:\/\/t.cn\/EMSyiof (2019)"},{"issue":"11","key":"25_CR24","doi-asserted-by":"publisher","first-page":"2365","DOI":"10.1109\/TIFS.2015.2455413","volume":"10","author":"X Yun","year":"2015","unstructured":"Yun, X., Li, S., Zhang, Y.: SMS worm propagation over contact social networks: modeling and validation. IEEE Trans. Inf. Forensics Secur. 10(11), 2365\u20132380 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"25_CR25","doi-asserted-by":"crossref","unstructured":"Zang, H., Bolot, J.: Anonymization of location data does not work: a large-scale measurement study. In: Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, pp. 145\u2013156. ACM (2011)","DOI":"10.1145\/2030613.2030630"},{"key":"25_CR26","doi-asserted-by":"crossref","unstructured":"Zhang, Y., et al.: Lies in the air: characterizing fake-base-station spam ecosystem in china. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 521\u2013534 (2020)","DOI":"10.1145\/3372297.3417257"}],"container-title":["Lecture Notes in Computer Science","Computational Science \u2013 ICCS 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-08751-6_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,21]],"date-time":"2022-06-21T06:05:54Z","timestamp":1655791554000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-08751-6_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031087509","9783031087516"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-08751-6_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"15 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"London","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccs-computsci2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iccs-meeting.org\/iccs2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"474","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"175","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"78","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.8","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}