{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:21:33Z","timestamp":1742948493350,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319651262"},{"type":"electronic","value":"9783319651279"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65127-9_14","type":"book-chapter","created":{"date-parts":[[2017,8,5]],"date-time":"2017-08-05T03:35:53Z","timestamp":1501904153000},"page":"171-182","source":"Crossref","is-referenced-by-count":2,"title":["Towards Self-aware Approach for Mobile Devices Security"],"prefix":"10.1007","author":[{"given":"Nanda Kumar","family":"Thanigaivelan","sequence":"first","affiliation":[]},{"given":"Ethiopia","family":"Nigussie","sequence":"additional","affiliation":[]},{"given":"Seppo","family":"Virtanen","sequence":"additional","affiliation":[]},{"given":"Jouni","family":"Isoaho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,6]]},"reference":[{"key":"14_CR1","unstructured":"Ericsson. Ericsson Mobility Report, November 2016. https:\/\/www.ericsson.com\/assets\/local\/mobility-report\/documents\/2016\/ericsson-mobility-report-november-2016.pdf . Accessed 22 Feb 2017"},{"key":"14_CR2","unstructured":"Gartner. Gartner says by 2018, more than 50 percent of users will use a tablet or smartphone first for all online activities (2014). http:\/\/www.gartner.com\/newsroom\/id\/2939217 . Accessed 22 Feb 2017"},{"key":"14_CR3","unstructured":"International Data Corporation. IDC: Smartphone OS Market Share, Q3 (2016). http:\/\/www.idc.com\/promo\/smartphone-market-share\/os . Accessed 22 Feb 2017"},{"key":"14_CR4","unstructured":"Apple Developer. API Reference Apple Developer Documentation. https:\/\/developer.apple.com\/reference . Accessed 22 Feb 2017"},{"key":"14_CR5","unstructured":"Android Developer. Package Index Android Developers. https:\/\/developer.android.com\/reference\/packages.html . Accessed 22 Feb 2017"},{"key":"14_CR6","unstructured":"Apple. iOS6 Software Update (2012). https:\/\/support.apple.com\/kb\/DL1578?locale=en_US . Accessed 22 Feb 2017"},{"key":"14_CR7","unstructured":"Android. Security Enhancements in Android 6.0. (2016). http:\/\/source.android.com\/security\/enhancements\/enhancements60.html . Accessed 22 Feb 2017"},{"key":"14_CR8","unstructured":"Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.-R.: Xmandroid: a new android evolution to mitigate privilege escalation attacks. Technische Universit\u00e4t Darmstadt, Technical report TR-2011-04 (2011)"},{"issue":"2","key":"14_CR9","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/2619091","volume":"32","author":"W Enck","year":"2014","unstructured":"Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. (TOCS) 32(2), 5 (2014)","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"key":"14_CR10","unstructured":"Heuser, S., Nadkarni, A., Enck, W., Sadeghi, A.-R.: ASM: a programmable interface for extending android security. In: Proceedings of 23rd USENIX Security Symposium (2014)"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Wang, X., Sun, K., Wang, Y., Jing, J.: Deepdroid: dynamically enforcing enterprise policy on android devices. In: Proceedings of 22nd Annual Network and Distributed System Security Symposium (NDSS 2015). The Internet Society (2015)","DOI":"10.14722\/ndss.2015.23263"},{"issue":"5","key":"14_CR12","doi-asserted-by":"crossref","first-page":"1426","DOI":"10.1109\/TIFS.2012.2204249","volume":"7","author":"M Conti","year":"2012","unstructured":"Conti, M., Crispo, B., Fernandes, E., Zhauniarovich, Y.: Cr\u00eape: a system for enforcing fine-grained context-related policies on android. IEEE Trans. Inf. Forensics Secur. 7(5), 1426\u20131438 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"14_CR13","unstructured":"Nieminen, J., Savolainen, T., Isomaki, M., Patil, B., Shelby, Z., Gomez, C.: RFC 7668 - IPv6 over BLUETOOTH $$\\textregistered $$ low energy. https:\/\/tools.ietf.org\/html\/rfc7668 . Accessed 23 Feb 2017"},{"key":"14_CR14","unstructured":"Wang, H., Xi, M., Liu, J., Chen, C.: Transmitting IPv6 packets over Bluetooth low energy based on BlueZ. In: 2013 15th International Conference on Advanced Communications Technology (ICACT), PyeongChang, pp. 72\u201377 (2013)"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Andersen, M.P., Fierro, G., Culler, D.E.: System design for a synergistic, low power Mote\/BLE embedded platform. In: 2016 15th ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN), Vienna, pp. 1\u201312 (2016)","DOI":"10.1109\/IPSN.2016.7460722"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Skorin-Kapov, L., Pripu\u017ei\u0107, K., Marjanovi\u0107, M., Antoni\u0107, A., \u017darko, I.P.: Energy efficient and quality-driven continuous sensor management for mobile IoT applications. In: 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Miami, FL, pp. 397\u2013406 (2014)","DOI":"10.4108\/icst.collaboratecom.2014.257320"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Angelopoulos, C.M., Evangelatos, O., Nikoletseas, S., Raptis, T.P., Rolim, J.D.P., Veroutis, K.: A user-enabled testbed architecture with mobile crowdsensing support for smart, green buildings. In: 2015 IEEE International Conference on Communications (ICC), London, pp. 573\u2013578 (2015)","DOI":"10.1109\/ICC.2015.7248383"},{"issue":"99","key":"14_CR18","first-page":"1","volume":"PP","author":"D Zhao","year":"2016","unstructured":"Zhao, D., Ma, H., Liu, L.: Frugal online incentive mechanisms for mobile crowd sensing. IEEE Trans. Veh. Technol. PP(99), 1 (2016)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"99","key":"14_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ACCESS.2017.2657820","volume":"PP","author":"L Shu","year":"2017","unstructured":"Shu, L., Chen, Y., Huo, Z., Bergmann, N., Wang, L.: When mobile crowd sensing meets traditional industry. IEEE Access PP(99), 1 (2017)","journal-title":"IEEE Access"},{"issue":"3","key":"14_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1698772.1698783","volume":"9","author":"L Guang","year":"2010","unstructured":"Guang, L., Nigussie, E., Rantala, P., Isoaho, J., Tenhunen, H.: Hierarchical agent monitoring design approach towards self-aware parallel systems-on-chip. ACM Trans. Embedded Comput. Syst. (TECS) 9(3), 1\u201326 (2010)","journal-title":"ACM Trans. Embedded Comput. Syst. (TECS)"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Isoaho, J., Virtanen, S., Tenhunen, H.: Current challenges in embedded communication systems. In: Innovations in Embedded and Real-Time Systems Engineering for Communication. IGI Global (2012)","DOI":"10.4018\/978-1-4666-0912-9.ch001"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Zhou, X., Demetriou, S., He, D., Naveed, M., Pan, X., Wang, X., Gunter, C.A., Nahrstedt, K.: Identity, location, disease and more: inferring your secrets from android public resources. In: 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 1017\u20131028. ACM (2013)","DOI":"10.1145\/2508859.2516661"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Narain, S., Vo-Huu, T.D., Block, K., Noubir, G.: Inferring user routes and locations using zero-permission mobile sensors. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 397\u2013413. IEEE (2016)","DOI":"10.1109\/SP.2016.31"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 95\u2013109. IEEE (2012)","DOI":"10.1109\/SP.2012.16"},{"key":"14_CR25","unstructured":"Avira Holding GmbH. Avira Mobile Security (version 2.1). https:\/\/itunes.apple.com\/us\/app\/avira-mobile-security\/id692893556 . Accessed 28 Feb 2017"},{"key":"14_CR26","unstructured":"NortonMobile. Norton Security & Antivirus (version 3.17.0.3205). https:\/\/play.google.com\/store\/apps\/details?id=com.symantec.mobilesecurity . Accessed 28 Feb 2017"},{"key":"14_CR27","unstructured":"Trend Micro Incorporated. Trend Micro Mobile Security (version 5.2.1089). https:\/\/itunes.apple.com\/us\/app\/trend-micro-mobile-security\/id630442428 . Accessed 28 Feb 2017"},{"key":"14_CR28","unstructured":"Avast Software. Mobile Security & Antivirus. https:\/\/play.google.com\/store\/apps\/details?id=com.avast.android.mobilesecurity . Accessed 28 Feb 2017"},{"issue":"1","key":"14_CR29","first-page":"61","volume":"7","author":"D Weyns","year":"2012","unstructured":"Weyns, D., Malek, S., Andersson, J.: FORMS: unifying reference model for formal specification of distributed self-adaptive systems. ACM Trans. Auton. Adaptive Syst. 7(1), 61 (2012)","journal-title":"ACM Trans. Auton. Adaptive Syst."},{"issue":"1","key":"14_CR30","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MC.2003.1160055","volume":"36","author":"JO Kephart","year":"2003","unstructured":"Kephart, J.O., Chess, D.M.: The vision of autonomic computing. Computer 36(1), 41\u201350 (2003)","journal-title":"Computer"},{"key":"14_CR31","unstructured":"Hoffmann, H., Maggio, M., Santambrogio, M.D., Leva, A., Agarwal, A.: SEEC: a framework for self-aware computing (2010)"},{"key":"14_CR32","doi-asserted-by":"crossref","unstructured":"Bailey, C., Montrieux, L., de Lemos, R., Yu, Y., Wermelinger, M.: Run-time generation, transformation, and verification of access control models for self-protection. In: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2014), pp. 135\u2013144. ACM (2014)","DOI":"10.1145\/2593929.2593945"},{"issue":"4","key":"14_CR33","first-page":"851","volume":"9","author":"DF Guo","year":"2014","unstructured":"Guo, D.F., Sui, A.F., Shi, Y.J., Hu, J.J., Lin, G.Z., Guo, T.: Behavior classification based self-learning mobile malware detection. J. Comput. 9(4), 851\u2013858 (2014)","journal-title":"J. Comput."},{"key":"14_CR34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cose.2014.02.009","volume":"43","author":"A Shabtai","year":"2014","unstructured":"Shabtai, A., Tenenboim-Chekina, L., Mimran, D., Rokach, L., Shapira, B., Elovici, Y.: Mobile malware detection through analysis of deviations in application network behaviour. Comput. Secur. 43, 1\u201318 (2014)","journal-title":"Comput. Secur."},{"key":"14_CR35","doi-asserted-by":"crossref","unstructured":"Li, F., Clarke, N., Papadaki, M., Dowland, P.: Behaviour profiling on mobile devices. In: International Conference on Emerging Security Technologies, Canterbury, pp. 77\u201382 (2010)","DOI":"10.1109\/EST.2010.26"},{"key":"14_CR36","first-page":"220","volume":"103","author":"F Tong","year":"2016","unstructured":"Tong, F., Yan, Z.: A hybrid approach of mobile malware detection in Android. J. Parallel Distrib. Comput. 103, 220\u201331 (2016)","journal-title":"J. Parallel Distrib. Comput."}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65127-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T22:13:47Z","timestamp":1569968027000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65127-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319651262","9783319651279"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65127-9_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}