{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T04:05:58Z","timestamp":1748837158208,"version":"3.41.0"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319315492"},{"type":"electronic","value":"9783319315508"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31550-8_14","type":"book-chapter","created":{"date-parts":[[2016,3,22]],"date-time":"2016-03-22T14:26:20Z","timestamp":1458656780000},"page":"214-225","source":"Crossref","is-referenced-by-count":0,"title":["RbacIP: A RBAC-Based Method for Intercepting and Processing Malicious Applications in Android Platform"],"prefix":"10.1007","author":[{"given":"Li","family":"Lin","sequence":"first","affiliation":[]},{"given":"Jian","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Jianbiao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,16]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Alazab, M., Moonsamy, V., Batten, L., et al.: Analysis of malicious and benign android applications. In: 2012 32nd International Conference on Distributed Computing System Workshops, pp. 608\u2013616 (2012)","DOI":"10.1109\/ICDCSW.2012.13"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Stephen, F., Dillon, S., Bing, W.: Manilyzer: automated android malware detection through manifest analysis. In: IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems, pp. 767\u2013772 (2014)","DOI":"10.1109\/MASS.2014.65"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Patrick, P., Wen-Kai, S.: Static detection of android malware by using permissions and API calls. In: International Conference on Machine Learning and Cybernetics, pp. 82\u201387 (2015)","DOI":"10.1109\/ICMLC.2014.7009096"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Daiyong, Q., Lidong, Z., Fan, Y., et al.: Detection of android malicious apps based on the sensitive behaviors. In: IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom, pp. 877\u2013883 (2014)","DOI":"10.1109\/TrustCom.2014.115"},{"key":"14_CR5","unstructured":"Mingshen, S., Min, Z., John, C., et al.: Design and implementation of an android host-based intrusion prevention system. In: Proceedings of the 30th Annual Computer Security Applications Conference (2014)"},{"key":"14_CR6","unstructured":"Wen-Chieh, W., Shih-Hao, H.: DroidDolphin: a dynamic android malware detection framework using big data and machine learning. In: Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems (2014)"},{"key":"14_CR7","first-page":"3","volume":"14","author":"W Qiang","year":"2011","unstructured":"Qiang, W., Jason, C., Konstantin, B., et al.: Authorization recycling in hierarchical RBAC systems. ACM Trans. Inf. Syst. Secur. 14, 3 (2011)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"14_CR8","unstructured":"Reinhard, T., Julio, S., Wolfgang, S., et al.: Dead or alive: finding zombie features in the linux kernel. In: Proceedings of the First International Workshop on Feature-Oriented Software Development (2009)"},{"key":"14_CR9","unstructured":"Jemin, L., Hyungshin, K.: Framework for automated power estimation of android applications. In: Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services (2013)"},{"key":"14_CR10","unstructured":"Zheng, S., Shijia, P., Yu-Chi, S., et al.: Headio: zero-configured heading acquisition for indoor mobile devices through multimodal context sensing. In: Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (2013)"},{"key":"14_CR11","unstructured":"Sebastian, F., Bert, A., Gerhard, T., et al.: CoenoFire: monitoring performance indicators of firefighters in real-world missions using smartphones. In: Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (2013)"},{"key":"14_CR12","unstructured":"Chuangang, R., Kai, C., Peng, L.: Droidmarking: resilient software water-marking for impeding android application repackaging. In: Proceedings of the 29th ACM\/IEEE International Conference on Automated Software Engineering (2014)"},{"key":"14_CR13","unstructured":"Kun, Y., Jianwei, Z., Yongke, W.: IntentFuzzer: detecting capability leaks of android applications. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (2014)"}],"container-title":["Lecture Notes in Computer Science","Trusted Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31550-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T22:21:36Z","timestamp":1748816496000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31550-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319315492","9783319315508"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31550-8_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}