{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T23:38:07Z","timestamp":1725838687036},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319256443"},{"type":"electronic","value":"9783319256450"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25645-0_36","type":"book-chapter","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T07:24:45Z","timestamp":1448263485000},"page":"475-487","source":"Crossref","is-referenced-by-count":0,"title":["Detecting Malicious Activity on Smartphones Using Sensor Measurements"],"prefix":"10.1007","author":[{"given":"Roger Piqueras","family":"Jover","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ilona","family":"Murynets","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jeffrey","family":"Bickford","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,11,6]]},"reference":[{"key":"36_CR1","unstructured":"Chinese mobile malware powers click-fraud scam. The Register, February 2011. \n                      http:\/\/goo.gl\/Jgmxmx"},{"key":"36_CR2","unstructured":"Security Alert - Android Trojan GGTracker Charges Premium Rate SMS Messages. The Lookout Blog, June 2011. \n                      http:\/\/goo.gl\/oo5oQZ"},{"key":"36_CR3","unstructured":"Android spam scam is first smart phone botnet. cNet, July 2012. \n                      http:\/\/goo.gl\/hyX1rF"},{"key":"36_CR4","unstructured":"Security Alert - SpamSoldier. The Lookout Blog, December 2012. \n                      http:\/\/goo.gl\/7lkRM"},{"key":"36_CR5","unstructured":"SMS Usage Remains Strong In The US: 6 Billion SMS Messages Are Sent Each Day. Forrester Research, June 2012. \n                      http:\/\/goo.gl\/WvTTGM"},{"key":"36_CR6","unstructured":"Study: Mobile Antivirus Apps Fail the Spyware Test. Time Magazine, July 2013. \n                      http:\/\/goo.gl\/xzQRFR"},{"key":"36_CR7","unstructured":"Google removes Bitcoin mining Android malware from Play. Threat Post, April 2014. \n                      http:\/\/goo.gl\/M9VMwW"},{"key":"36_CR8","unstructured":"McAfee Threats Report: Third Quarter 2013. McAfee Labs (2014). \n                      http:\/\/goo.gl\/y5uAfv"},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"Bickford, J., Lagar-Cavilla, H., Varshavsky, A., Ganapthy, V., Iftode, L.: Security versus energy tradeoffs in host-based mobile malware detection. In: Proc. 9th Conference on Mobile Systems, Applications and Services (2011)","DOI":"10.1145\/1999995.2000017"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Bose, A., Hu, X., Shin, K.G., Park, T.: Behavioral detection of malware on mobile handsets. In: Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services, pp. 225\u2013238. ACM (2008)","DOI":"10.1145\/1378600.1378626"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 15\u201326. ACM (2011)","DOI":"10.1145\/2046614.2046619"},{"key":"36_CR12","doi-asserted-by":"crossref","unstructured":"Giura, P., Murynets, I., Jover, R.P., Vahlis, Y.: Is it really you?: user identification via adaptive behavior fingerprinting. In: CODASPY 2014, pp. 333\u2013344. ACM (2014)","DOI":"10.1145\/2557547.2557554"},{"issue":"1","key":"36_CR13","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The weka data mining software: an update. ACM SIGKDD Explorations Newsletter 11(1), 10\u201318 (2009)","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"36_CR14","doi-asserted-by":"crossref","unstructured":"Hamlen, K.W., Mohan, V., Masud, M.M., Khan, L., Thuraisingham, B.: Exploiting an Antivirus Interface. Computer Standards and Interfaces, November 2009","DOI":"10.1016\/j.csi.2009.04.004"},{"key":"36_CR15","doi-asserted-by":"crossref","unstructured":"Huang, J., Qian, F., Gerber, A., Mao, Z.M., Sen, S., Spatscheck, O.: A close examination of performance and power characteristics of 4g lte networks. In: Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, pp. 225\u2013238. ACM (2012)","DOI":"10.1145\/2307636.2307658"},{"key":"36_CR16","unstructured":"Jiang, X.: An Evaluation of the Application Verification Service in Android 4.2. \n                      http:\/\/www.csc.ncsu.edu\/faculty\/jiang\/appverify\/"},{"key":"36_CR17","unstructured":"Jover, R.P., Murynets, I.: Malware and anomaly detection via activity recognition based on sensor data, May 7, 2015. US Patent 20,150,128,265"},{"issue":"2","key":"36_CR18","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/1964897.1964918","volume":"12","author":"JR Kwapisz","year":"2011","unstructured":"Kwapisz, J.R., Weiss, G.M., Moore, S.A.: Activity recognition using cell phone accelerometers. ACM SigKDD Explorations Newsletter 12(2), 74\u201382 (2011)","journal-title":"ACM SigKDD Explorations Newsletter"},{"key":"36_CR19","doi-asserted-by":"crossref","unstructured":"Li, H., Ma, D., Saxena, N., Shrestha, B., Zhu, Y.: Tap-wave-rub: lightweight malware prevention for smartphones using intuitive human gestures. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 25\u201330. ACM (2013)","DOI":"10.1145\/2462096.2462101"},{"key":"36_CR20","unstructured":"Lookout. U.S. targeted by coercive mobile ransomware impersonating the FBI, July 2014. \n                      http:\/\/goo.gl\/uh0a6a"},{"key":"36_CR21","doi-asserted-by":"crossref","unstructured":"Miluzzo, E., Varshavsky, A., Balakrishnan, S., Choudhury, R.R.: Tapprints: your finger taps have fingerprints. In: Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, MobiSys 2012, pp. 323\u2013336. ACM, New York (2012)","DOI":"10.1145\/2307636.2307666"},{"key":"36_CR22","unstructured":"Oberheide, J., Miller, C.: Dissecting android\u2019s bouncer. In: SummerCon (2012)"},{"issue":"3","key":"36_CR23","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1109\/TBME.2008.2006190","volume":"56","author":"SJ Preece","year":"2009","unstructured":"Preece, S.J., Goulermas, J.Y., Kenney, L.P., Howard, D.: A comparison of feature extraction methods for the classification of dynamic activities from accelerometer data. IEEE Transactions on Biomedical Engineering 56(3), 871\u2013879 (2009)","journal-title":"IEEE Transactions on Biomedical Engineering"},{"issue":"4","key":"36_CR24","doi-asserted-by":"crossref","first-page":"639","DOI":"10.3233\/JCS-2010-0410","volume":"19","author":"K Rieck","year":"2011","unstructured":"Rieck, K., Trinius, P., Willems, C., Holz, T.: Automatic analysis of malware behavior using machine learning. Journal of Computer Security 19(4), 639\u2013668 (2011)","journal-title":"Journal of Computer Security"},{"key":"36_CR25","doi-asserted-by":"crossref","unstructured":"Shrestha, B., Mohamed, M., Borg, A., Saxena, N., Tamrakar, S.: Curbing mobile malware based on user-transparent hand movements. In: Pervasive Computing (PerCom 2015) (2015)","DOI":"10.1109\/PERCOM.2015.7146532"},{"key":"36_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-319-02937-5_11","volume-title":"Cryptology and Network Security","author":"B Shrestha","year":"2013","unstructured":"Shrestha, B., Saxena, N., Harrison, J.: Wave-to-access: protecting sensitive mobile device services via a hand waving gesture. In: Abdalla, M., Nita-Rotaru, C., Dahab, R. (eds.) CANS 2013. LNCS, vol. 8257, pp. 199\u2013217. Springer, Heidelberg (2013)"},{"key":"36_CR27","unstructured":"Templeman, R., Rahman, Z., Crandall, D.J., Kapadia, A.: Placeraider: Virtual theft in physical spaces with smartphones. CoRR, abs\/1209.5982 (2012)"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25645-0_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T12:49:07Z","timestamp":1559306947000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25645-0_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319256443","9783319256450"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25645-0_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}