{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:38:31Z","timestamp":1761957511230,"version":"build-2065373602"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642043413"},{"type":"electronic","value":"9783642043420"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04342-0_11","type":"book-chapter","created":{"date-parts":[[2009,9,28]],"date-time":"2009-09-28T23:00:22Z","timestamp":1254178822000},"page":"202-223","source":"Crossref","is-referenced-by-count":16,"title":["SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Guanhua","family":"Yan","sequence":"first","affiliation":[]},{"given":"Stephan","family":"Eidenbenz","sequence":"additional","affiliation":[]},{"given":"Emanuele","family":"Galli","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Bose, A., Hu, X., Shin, K.G., Park, T.: Behavioral detection of malware on mobile handsets. In: Proceedings of MobiSys 2008 (2008)","DOI":"10.1145\/1378600.1378626"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Computing Survey (September 2009) (to appear)","DOI":"10.1145\/1541880.1541882"},{"key":"11_CR3","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611","volume-title":"Elements of Information Theory","author":"T. Cover","year":"1991","unstructured":"Cover, T., Thomas, J.: Elements of Information Theory. John Wiley, Chichester (1991)"},{"key":"11_CR4","unstructured":"http:\/\/www.redherring.com\/Home\/19081"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Davis, A.B., Goyal, S.K.: Knowledge-based management of cellular clone fraud. In: Proceedings of IEEE PIMRC 1992, Boston, MA, USA (1992)","DOI":"10.1109\/PIMRC.1992.279930"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Enck, W., Traynor, P., McDaniel, P., Porta, T.L.: Exploiting open functionality in SMS-capable cellular networks. In: Proceedings of CCS 2005 (2005)","DOI":"10.1145\/1102120.1102171"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Fawcett, T., Provost, F.: Activity monitoring: noticing interesting changes in behavior. In: Proceedings of ACM KDD 1999 (1999)","DOI":"10.1145\/312129.312195"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Hu, G., Venugopal, D.: A malware signature extraction and detection method applied to mobile networks. In: Proceedings of IPCCC 2007 (April 2007)","DOI":"10.1109\/PCCC.2007.358875"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Kim, H., Smith, J., Shin, K.G.: Detecting energy-greedy anomalies and mobile malware variants. In: Proceedings of MobiSys (2008)","DOI":"10.1145\/1378600.1378627"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Lee, L.: Measures of distributional similarity. In: Proceedings of the 37th Annual Meeting of the ACL (1999)","DOI":"10.3115\/1034678.1034693"},{"key":"11_CR11","unstructured":"Lee, W., Xiang, D.: Information-theoretic measures for anomaly detection. In: Proceedings of IEEE S&P (2001)"},{"key":"11_CR12","volume-title":"Wireless and Mobile Network Architectures","author":"Y. Lin","year":"2001","unstructured":"Lin, Y., Chlamtac, I.: Wireless and Mobile Network Architectures. John Wiley & Sons, Inc., Chichester (2001)"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Meng, X., Zerfos, P., Samanta, V., Wong, S.H.Y., Lu, S.: Analysis of the reliability of a nationwide short message service. In: Proceedings of INFOCOM 2007 (2007)","DOI":"10.1109\/INFCOM.2007.211"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Noble, C.C., Cook, D.J.: Graph-based anomaly detection. In: KDD 2003: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining (2003)","DOI":"10.1145\/956750.956831"},{"key":"11_CR15","unstructured":"http:\/\/www.vnunet.com\/vnunet\/news\/2163586\/sms-phishing-attack-seen-wild"},{"key":"11_CR16","unstructured":"http:\/\/www.kval.com\/news\/local\/17945949.html"},{"key":"11_CR17","unstructured":"http:\/\/www.mobilemarketer.com\/cms\/opinion\/columns\/1610.html"},{"key":"11_CR18","unstructured":"http:\/\/www.textually.org\/textually\/archives\/2007\/12\/018482.htm"},{"key":"11_CR19","unstructured":"http:\/\/www.openmindnetworks.com\/SMSSpoofing.asp"},{"issue":"2","key":"11_CR20","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1145\/1149121.1149125","volume":"6","author":"S.J. Stolfo","year":"2006","unstructured":"Stolfo, S.J., Hershkop, S., Hu, C., Li, W., Nimeskern, O., Wang, K.: Behavior-based modeling and its application to email analysis. ACM Transactions on Internet Technology\u00a06(2), 187\u2013221 (2006)","journal-title":"ACM Transactions on Internet Technology"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Sun, B., Yu, F., Wu, K., Xiao, Y., Leung, V.C.M.: Enhancing security using mobility-based anomaly detection in cellular mobile networks. IEEE Trans. on Vehicular Technology\u00a055(3) (2006)","DOI":"10.1109\/TVT.2006.874579"},{"key":"11_CR22","unstructured":"http:\/\/searchcio-midmarket.techtarget.com\/tip\/0,289483,sid183_gci1310706,00.html"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Taniguchi, M., Haft, M., Hollmn, J., Tresp, V.: Fraud detection in communications networks using neural and probabilistic methods. In: Proceedings of the 1998 IEEE International Conference in Acoustics, Speech and Signal Processing (1998)","DOI":"10.1109\/ICASSP.1998.675496"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Traynor, P., Enck, W., McDaniel, P., Porta, T.L.: Mitigating attacks on open functionality in SMS-capable cellular networks. In: Proceedings of MobiCom 2006 (2006)","DOI":"10.1145\/1161089.1161111"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Yan, G., Eidenbenz, S., Sun, B.: Mobi-watchdog: you can steal, but you can\u2019t run! In: Proceedings of ACM WiSec 2009, Zurich, Switzerland (2009)","DOI":"10.1145\/1514274.1514295"},{"key":"11_CR26","unstructured":"Yan, G., Xiao, Z., Eidenbenz, S.: Catching instant messaging worms with change-point detection techniques. In: LEET 2008: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, Berkeley, CA, USA (2008)"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Zerfos, P., Meng, X., Samanta, V., Wong, S.H.Y., Lu, S.: A study of the short message service of a nationwide cellular carrier. In: Proceedings of IMC 2006 (2006)","DOI":"10.1145\/1177080.1177114"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04342-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T22:11:36Z","timestamp":1558563096000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04342-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642043413","9783642043420"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04342-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}