{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:30:41Z","timestamp":1767339041848,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319527116"},{"type":"electronic","value":"9783319527123"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-52712-3_13","type":"book-chapter","created":{"date-parts":[[2017,1,18]],"date-time":"2017-01-18T13:04:40Z","timestamp":1484744680000},"page":"177-191","source":"Crossref","is-referenced-by-count":2,"title":["Security in Mobile Computing: Attack Vectors, Solutions, and Challenges"],"prefix":"10.1007","author":[{"given":"Sara","family":"Alwahedi","sequence":"first","affiliation":[]},{"given":"Mariam","family":"Al Ali","sequence":"additional","affiliation":[]},{"given":"Fatimah","family":"Ishowo-Oloko","sequence":"additional","affiliation":[]},{"given":"Wei Lee","family":"Woon","sequence":"additional","affiliation":[]},{"given":"Zeyar","family":"Aung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,19]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Adebayo, O.S., AbdulAziz, N.: Android malware classification using static code analysis and apriori algorithm improved with particle swarm optimization. In: Proceedings of 2014 4th World Congress on Information and Communication Technologies (WICT), pp. 123\u2013128 (2014)","DOI":"10.1109\/WICT.2014.7077314"},{"key":"13_CR2","volume-title":"Hacking Exposed: Mobile Security Secrets and Solutions","author":"N Bergman","year":"2013","unstructured":"Bergman, N., Stanfield, M., Rouse, J., Scambray, J.: Hacking Exposed: Mobile Security Secrets and Solutions. McGraw-Hill Education, New York (2013)"},{"key":"13_CR3","unstructured":"Chien, E.: Motivations of recent Android malware. Technical report, Symantec Security Response (2011)"},{"key":"13_CR4","first-page":"177","volume":"3","author":"G Deepak","year":"2012","unstructured":"Deepak, G., Pradeep, B.: Challenging issues and limitations of mobile computing. Int. J. Comput. Technol. Appl. 3, 177\u2013181 (2012)","journal-title":"Int. J. Comput. Technol. Appl."},{"key":"13_CR5","doi-asserted-by":"crossref","first-page":"759","DOI":"10.1007\/978-1-4419-5906-5_324","volume-title":"Encyclopedia of Cryptography and Security","author":"Y Desmedt","year":"2011","unstructured":"Desmedt, Y.: Man-in-the-middle attack. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, p. 759. Springer, Heidelberg (2011)"},{"key":"13_CR6","doi-asserted-by":"crossref","first-page":"6:1","DOI":"10.1145\/2522968.2522974","volume":"46","author":"F Esposito","year":"2013","unstructured":"Esposito, F., Matta, I., Ishakian, V.: Slice embedding solutions for distributed service architectures. ACM Comput. Surv. 46, 6:1\u20136:29 (2013)","journal-title":"ACM Comput. Surv."},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Fedler, R., Kulicke, M., Schutte, J.: An antivirus API for Android malware recognition. In: Proceedings of 2013 8th International Conference on Malicious and Unwanted Software: \u201cThe Americas\u201d (MALWARE), pp. 77\u201384 (2013)","DOI":"10.1109\/MALWARE.2013.6703688"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: Proceedings of 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), pp. 3\u201314 (2011)","DOI":"10.1145\/2046614.2046618"},{"key":"13_CR9","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garc\u00eda-Teodoro","year":"2009","unstructured":"Garc\u00eda-Teodoro, P., D\u00edaz-Verdejo, J., Maci\u00e1-Fern\u00e1ndez, G., V\u00e1zquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28, 18\u201328 (2009)","journal-title":"Comput. Secur."},{"key":"13_CR10","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1109\/MWC.2015.7054729","volume":"22","author":"D He","year":"2015","unstructured":"He, D., Chan, S., Guizani, M.: Mobile application security: malware threats and defenses. IEEE Wirel. Commun. 22, 138\u2013144 (2015)","journal-title":"IEEE Wirel. Commun."},{"key":"13_CR11","unstructured":"Ladan, M.I.: Mobile computing: security issues. In: Proceedings of 2013 International Conference on Wireless Networks (ICWN), pp. 1\u20136 (2013)"},{"key":"13_CR12","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MC.2008.159","volume":"41","author":"G Lawton","year":"2008","unstructured":"Lawton, G.: Is it finally time to worry about mobile malware? Computer 41, 12\u201314 (2008)","journal-title":"Computer"},{"key":"13_CR13","first-page":"20","volume":"38","author":"N Leavitt","year":"2005","unstructured":"Leavitt, N.: Mobile phones: the next frontier for hackers? Computer 38, 20\u201323 (2005)","journal-title":"Computer"},{"key":"13_CR14","unstructured":"Li, W., Joshi, A.: Security issues in mobile ad hoc networks - a survey. Technical report, University of Maryland, USA (2008)"},{"key":"13_CR15","first-page":"399","volume":"2","author":"N Masoud","year":"2012","unstructured":"Masoud, N., Karimi, R., Hasanvand, H.A.: Mobile computing: principles, devices and operating systems. World Appl. Program. 2, 399\u2013408 (2012)","journal-title":"World Appl. Program."},{"key":"13_CR16","unstructured":"mEducation: safeguarding, security and privacy in mobile education. Technical report, GSMA Connected Living Programme: mEducation (2012)"},{"key":"13_CR17","unstructured":"Miller, C., Honoroff, J., Mason, J.: Security evaluation of Apple\u2019s iPhone. Technical report, Independent Security Evaluators (2007)"},{"key":"13_CR18","first-page":"66","volume":"3","author":"M Nassar","year":"2015","unstructured":"Nassar, M.: Wireless and mobile computing security challenges and their possible solutions. Am. Sci. Res. J. Eng. Technol. Sci. 3, 66\u201374 (2015)","journal-title":"Am. Sci. Res. J. Eng. Technol. Sci."},{"key":"13_CR19","unstructured":"Peikari, C.: Protecting embedded devices with integrated permission control (2006). US patent number US20060026687 A1, http:\/\/www.google.com\/patents\/US20060026687"},{"key":"13_CR20","unstructured":"Pullela, S.: Security issues in mobile computing. Technical report, University of Texas at Arlington, USA (2002)"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Quercia, D., Hailes, S.: Sybil attacks against mobile users: friends and foes to the rescue. In: Proceedings of 2010 IEEE International Conference on Computer Communications (INFOCOM), pp. 1\u20135 (2010)","DOI":"10.1109\/INFCOM.2010.5462218"},{"key":"13_CR22","first-page":"338","volume":"1","author":"HN Saha","year":"2010","unstructured":"Saha, H.N., Bhattacharyya, D., Banerjee, P.K.: Semi-centralized multi-authenticated RSSI based solution to Sybil attack. Int. J. Netw. Secur. Appl. 1, 338\u2013341 (2010)","journal-title":"Int. J. Netw. Secur. Appl."},{"key":"13_CR23","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.jnca.2013.05.008","volume":"38","author":"SH Seo","year":"2014","unstructured":"Seo, S.H., Gupta, A., Sallam, A.M., Bertino, E., Yim, K.: Detecting mobile malware threats to homeland security through static analysis. J. Netw. Comput. Appl. 38, 43\u201353 (2014)","journal-title":"J. Netw. Comput. Appl."},{"key":"13_CR24","unstructured":"Shields, C., Levine, B.N., Margolin, N.B.: A survey of solutions to the Sybil attack. Technical report, University of Massachusetts Amherst, USA (2006)"},{"key":"13_CR25","doi-asserted-by":"crossref","DOI":"10.1002\/9781118027974","volume-title":"Information Security Principles and Practice","author":"M Stamp","year":"2011","unstructured":"Stamp, M.: Information Security Principles and Practice. Wiley, New York (2011)"},{"key":"13_CR26","first-page":"135","volume":"4","author":"A Vasudeva","year":"2012","unstructured":"Vasudeva, A., Sood, M.: Sybil attack on lowest ID clustering algorithm in the mobile ad hoc network. Int. J. Netw. Secur. Appl. 4, 135\u2013147 (2012)","journal-title":"Int. J. Netw. Secur. Appl."},{"key":"13_CR27","volume-title":"Critical Threads 2006: IT*Security","author":"D Verton","year":"2006","unstructured":"Verton, D.: Critical Threads 2006: IT*Security. Lulu.com, Raleigh (2006)"},{"key":"13_CR28","unstructured":"Wu, H., Schwab, S., Peckhams, R.L.: Signature based network intrusion detection system and method (2008). US patent number US7424744 B1, https:\/\/www.google.com\/patents\/US7424744"},{"key":"13_CR29","doi-asserted-by":"crossref","DOI":"10.1201\/9780849379253","volume-title":"Security in Distributed, Grid, Mobile, and Pervasive Computing","author":"Y Xiao","year":"2007","unstructured":"Xiao, Y.: Security in Distributed, Grid, Mobile, and Pervasive Computing. Auerbach Publications, Boston (2007)"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: SybilGuard: defending against Sybil attacks via social networks. In: Proceedings of 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), pp. 267\u2013278 (2006)","DOI":"10.1145\/1159913.1159945"},{"key":"13_CR31","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting Android malware: characterization and evolution. In: Proceedings of 2012 IEEE Symposium on Security and Privacy (S&P), pp. 95\u2013109 (2012)","DOI":"10.1109\/SP.2012.16"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile Networks and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-52712-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T03:46:11Z","timestamp":1601351171000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-52712-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319527116","9783319527123"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-52712-3_13","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}