{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T04:30:36Z","timestamp":1747801836576,"version":"3.41.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319155081"},{"type":"electronic","value":"9783319155098"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-15509-8_6","type":"book-chapter","created":{"date-parts":[[2015,3,3]],"date-time":"2015-03-03T07:09:05Z","timestamp":1425366545000},"page":"70-82","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Uncovering the Footprints of Malicious Traffic in Cellular Data Networks"],"prefix":"10.1007","author":[{"given":"Arun","family":"Raghuramu","sequence":"first","affiliation":[]},{"given":"Hui","family":"Zang","sequence":"additional","affiliation":[]},{"given":"Chen-Nee","family":"Chuah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,4]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Wei, X., Gomez, L., Neamtiu, I., Faloutsos, M.: Malicious android applications in the enterprise: What do they do and how do we fix it? In: Proceedings of 28th IEEE International Conference on Data Engineering Workshops (ICDEW) (2012)","DOI":"10.1109\/ICDEW.2012.81"},{"key":"6_CR2","unstructured":"Lever, C., Antonakakis, M., Reaves, B., Traynor, P., Lee, W.: The core of the matter: analyzing malicious traffic in cellular carriers. In: Proceedings of NDSS 2013 (2013)"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Truong, H.T.T., Lagerspetz, E., et al.: The company you keep: mobile malware infection rates and inexpensive risk indicators. In: Proceedings of 23rd International Conference on World Wide Web, pp. 39\u201350 (2014)","DOI":"10.1145\/2566486.2568046"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Identifying suspicious URLs: an application of large-scale online learning. In: Proceedings of 26th ACM Annual International Conference on Machine Learning, pp. 681\u2013688 (2009)","DOI":"10.1145\/1553374.1553462"},{"key":"6_CR5","unstructured":"Choi, H., Zhu, B.B., Lee, H.: Detecting malicious web links and identifying their attack types. In: Proceedings of 2nd USENIX Conference on Web Application Development (2011)"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Blum, A., Wardman, B., Solorio, T., Warner, G.: Lexical feature based phishing URL detection using online learning. In: Proceedings of 3rd ACM Workshop on Artificial Intelligence and Security, pp. 54\u201360 (2010)","DOI":"10.1145\/1866423.1866434"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Le, A., Markopoulou, A., Faloutsos, M.: Phishdef: URL names say it all. In: Proceedings of IEEE INFOCOM, pp. 191\u2013195 (2011)","DOI":"10.1109\/INFCOM.2011.5934995"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Invernizzi, L., Miskovic, S., et al.: Nazca: detecting malware distribution in large-scale networks. In: Proceedings of NDSS 2014 (2014)","DOI":"10.14722\/ndss.2014.23269"},{"key":"6_CR9","unstructured":"The virustotal online scanner. http:\/\/www.virustotal.com\/en\/about"},{"key":"6_CR10","unstructured":"Maslennikov, D.: Zeus in the mobile - facts and theories (2011). http:\/\/www.securelist.com\/en\/analysis\/204792194"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"El Sawda, S., Urien, P.: SIP security attacks and solutions: a state-of-the-art review. In: IEEE Information and Communication Technologies, ICTTA 2006, vol. 2, pp. 3187\u20133191 (2006)","DOI":"10.1109\/ICTTA.2006.1684926"},{"issue":"1\u20134","key":"6_CR12","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/COMST.2006.253270","volume":"8","author":"D Geneiatakis","year":"2006","unstructured":"Geneiatakis, D., Dagiuklas, T., et al.: Survey of security vulnerabilities in session initiation protocol. IEEE Commun. Surv. Tutor. 8(1\u20134), 68\u201381 (2006)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"6_CR13","unstructured":"Patterson, S.M.: Contrary to what you\u2019ve heard, Android is almost impenetrable to malware (2013). http:\/\/qz.com\/131436\/contrary-to-what-youve-heard-android-is-almost-impenetrable-to-malware"},{"key":"6_CR14","unstructured":"Cisco 2014 annual security report. http:\/\/www.cisco.com\/web\/offers\/lp\/2014-annual-security-report\/index.html"},{"key":"6_CR15","unstructured":"Liu, H., Setiono, R.: Chi2: feature selection and discretization of numeric attributes. In: IEEE 7th International Conference on Tools with Artificial Intelligence, pp. 388\u2013391 (1995)"},{"issue":"1","key":"6_CR16","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001)","journal-title":"Mach. Learn."}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-15509-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T17:06:58Z","timestamp":1747760818000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-15509-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319155081","9783319155098"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-15509-8_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"4 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}