{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T23:55:28Z","timestamp":1725839728709},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319268439"},{"type":"electronic","value":"9783319268446"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26844-6_37","type":"book-chapter","created":{"date-parts":[[2015,11,28]],"date-time":"2015-11-28T09:31:34Z","timestamp":1448703094000},"page":"497-512","source":"Crossref","is-referenced-by-count":1,"title":["Evaluating Mobile Malware by Extracting User Experience-Based Features"],"prefix":"10.1007","author":[{"given":"Francesco","family":"Mercaldo","sequence":"first","affiliation":[]},{"given":"Corrado Aaron","family":"Visaggio","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,5]]},"reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Canfora, G., Mercaldo, F., Visaggio, C.A., D\u2019Angelo, M., Furno, A., Manganelli, C.: A case study of automating user experience-oriented performance testing on smartphones. In: Proceedings of IEEE Sixth International Conference on Software Testing, Verification and Validation (ICST) (2013)","DOI":"10.1109\/ICST.2013.16"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Dixon, B., Jiang, Y., Jaiantilal, A., Mishra, S.: Location based power analysis to detect malicious code in smartphones. In: Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices (2011)","DOI":"10.1145\/2046614.2046620"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Kim, H., Smith, J., Shin, K.G.: Detecting energy-greedy anomalies and mobile malware variants. In: Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (2008)","DOI":"10.1145\/1378600.1378627"},{"key":"37_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-642-04342-0_13","volume-title":"Recent Advances in Intrusion Detection","author":"L Liu","year":"2009","unstructured":"Liu, L., Yan, G., Zhang, X., Chen, S.: VirusMeter: Preventing Your Cellphone from Spies. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol. 5758, pp. 244\u2013264. Springer, Heidelberg (2009)"},{"issue":"3","key":"37_CR5","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1109\/TCE.2013.6626257","volume":"59","author":"J Wei","year":"2013","unstructured":"Wei, J., Juarez, E., Garrido, M., Pescador, F.: Maximizing the user experience with energy-based fair sharing in battery limited mobile systems. IEEE Trans. Consum. Electron. 59(3), 690\u2013698 (2013)","journal-title":"IEEE Trans. Consum. Electron."},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Deryckere, T., Martens, L., De Marez, L., De Moor, K., Berte, K.: A software tool to relate technical performance to user experience in a mobile context. In: Proceedings of IEEE Sixth International Symposium on a World of Wireless, Mobile and Multimedia Networks) (2008)","DOI":"10.1109\/WOWMOM.2008.4594902"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Canfora, G., Mercaldo, F., Visaggio, C.A.: Mobile malware detection using op-code frequency histograms. In: Proceedings of International Conference on Security and Cryptography (SECRYPT) (2015)","DOI":"10.5220\/0005537800270038"},{"key":"37_CR8","doi-asserted-by":"crossref","unstructured":"Canfora, G., Mercaldo, F., Moriano, G., Visaggio, C.A.: Composition-malware: building android malware at run time. In: Proceedings of International Workshop on Security of Mobile Applications (ARES) (2015)","DOI":"10.1109\/ARES.2015.64"},{"key":"37_CR9","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s10844-010-0148-x","volume":"38","author":"A Shabtai","year":"2012","unstructured":"Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: Andromaly: a behavioral malware detection framework for android devices. J. Intell. Inf. Syst. 38, 161\u2013190 (2012)","journal-title":"J. Intell. Inf. Syst."},{"key":"37_CR10","doi-asserted-by":"crossref","unstructured":"Blasing, T., Schmidt, A.D., Batyuk, L., Camtepe, S.A., Albayrak, S.: An android application sandbox system for suspicious software detection. In: Proceedings of 5th International Conference on Malicious and Unwanted Software (2010)","DOI":"10.1109\/MALWARE.2010.5665792"},{"issue":"8","key":"37_CR11","doi-asserted-by":"publisher","first-page":"1524","DOI":"10.1016\/j.jss.2010.03.046","volume":"83","author":"A Shabtai","year":"2010","unstructured":"Shabtai, A., Kanonov, U., Elovici, Y.: Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method. J. Syst. Softw. 83(8), 1524\u20131537 (2010)","journal-title":"J. Syst. Softw."},{"key":"37_CR12","doi-asserted-by":"crossref","unstructured":"Canfora, G., Mercaldo, F., Visaggio, C.A.: A classifier of malicious android applications. In: Proceedings of the 2nd International Workshop on Security of Mobile Applications (ARES) (2013)","DOI":"10.1109\/ARES.2013.80"},{"key":"37_CR13","first-page":"255","volume":"10","author":"W Enck","year":"2010","unstructured":"Enck, W., Gilbert, P., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.: Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. OSDI 10, 255\u2013270 (2010)","journal-title":"OSDI"},{"key":"37_CR14","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K.: Drebin: effective and explainable detection of android malware in your pocket. In: Proceedings of NDSS 2014, Network and Distributed System Security Symposium (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"37_CR15","doi-asserted-by":"crossref","unstructured":"Spreitzenbarth, M., Ectler, F., Schreck, T., Freling, F., Hoffmann, J.: Mobilesandbox: looking deeper into android applications. In: Proceedings of SAC 2013, 28th International ACM Symposium on Applied Computing (2013)","DOI":"10.1145\/2480362.2480701"}],"container-title":["Lecture Notes in Computer Science","Product-Focused Software Process Improvement"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26844-6_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T14:39:36Z","timestamp":1559313576000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26844-6_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319268439","9783319268446"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26844-6_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}