{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:41:36Z","timestamp":1759092096373},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642043413"},{"type":"electronic","value":"9783642043420"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04342-0_13","type":"book-chapter","created":{"date-parts":[[2009,9,28]],"date-time":"2009-09-28T23:00:22Z","timestamp":1254178822000},"page":"244-264","source":"Crossref","is-referenced-by-count":81,"title":["VirusMeter: Preventing Your Cellphone from Spies"],"prefix":"10.1007","author":[{"given":"Lei","family":"Liu","sequence":"first","affiliation":[]},{"given":"Guanhua","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Xinwen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Songqing","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"http:\/\/www.wellingtonfund.com\/blog\/2007\/02\/19\/gmp-3gsm-wrapup\/"},{"key":"13_CR2","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Smartphone"},{"key":"13_CR3","unstructured":"http:\/\/www.viruslibrary.com\/"},{"key":"13_CR4","unstructured":"http:\/\/vx.netlux.org\/29a\/"},{"key":"13_CR5","unstructured":"http:\/\/www.flexispy.com\/"},{"key":"13_CR6","unstructured":"http:\/\/www.panasonic.com\/inustrial_oem\/battery\/battery_oem\/chem\/lith\/lith.htm"},{"key":"13_CR7","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Stepwise_regression"},{"key":"13_CR8","unstructured":"Commwarrior, http:\/\/www.f-secure.com\/v-descs\/commwarrior.shtml"},{"key":"13_CR9","unstructured":"Sprots fans in helsinki falling prey to cabir, http:\/\/news.zdnet.com"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Bose, A., Hu, X., Shin, K., Park, T.: Behavioral detection of malware on mobile handsets. In: Proceedings of Mobisys, Breckenridge, CO (June 2008)","DOI":"10.1145\/1378600.1378626"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Bose, A., Shin, K.: On mobile virus exploiting messaging and bluetooth services. In: Proceedings of Securecomm (2006)","DOI":"10.1109\/SECCOMW.2006.359562"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Bose, A., Shin, K.: Proactive security for mobile messaging networks. In: Proceedings of WiSe (2006)","DOI":"10.1145\/1161289.1161307"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Cheng, J., Wong, S., Yang, H., Lu, S.: Smartsiren: Virus detection and alert for smartphones. In: Proceedings of ACM MobiSys, San Juan, Puerto Rico (2007)","DOI":"10.1145\/1247660.1247690"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Chiasserini, C., Rao, R.: Pulsed battery discharge in communication devices. In: Proceedings of MobiComm, Seattle, WA (August 1999)","DOI":"10.1145\/313451.313488"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Dagon, D., Martin, T., Starner, T.: Mobile phones as computing devices: The viruses are coming! IEEE Pervasive Computing (2004)","DOI":"10.1109\/MPRV.2004.21"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Enck, W., Traynor, P., McDaniel, P., Porta, T.: Exploiting open functionality in sms-capable cellular networks. In: Proceedings of CCS 2005 (November 2005)","DOI":"10.1145\/1102120.1102171"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Fleizach, C., Liljenstam, M., Johansson, P., Voelker, G., Mehes, A.: Can you infect me now? malware propagation in mobile phone networks. In: Proceedings of WORMS, Alexandria, VA (November 2007)","DOI":"10.1145\/1314389.1314402"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Fuller, T., Doyle, M., Newman, J.: Simulation and optimization of the dual lithium ion insertion cell. Journal of Electrochem. Soc.\u00a0141 (April 1994)","DOI":"10.1149\/1.2054684"},{"key":"13_CR19","unstructured":"Guo, C., Wang, H., Zhu, W.: Smart-phone attacks and defenses. In: Proceedings of HotNets III, San Diego, CA (November 2004)"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Hu, G., Venugopal, D.: A malware signature extraction and detection method applied to mobile networks. In: Proceedings of IPCCC (April 2007)","DOI":"10.1109\/PCCC.2007.358875"},{"key":"13_CR21","unstructured":"Hypponen, M.: http:\/\/www.usenix.org\/events\/sec07\/tech\/hypponen.pdf"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Kim, H., Smith, J., Shin, K.: Detecting energy-greedy anomalies and mobile malware variants. In: Proceedings of Mobisys, Breckenridge, CO (June 2008)","DOI":"10.1145\/1378600.1378627"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Mickens, J., Noble, B.: Modeling epidemic spreading in mobile networks. In: Proceedings of ACM WiSe (2005)","DOI":"10.1145\/1080793.1080806"},{"key":"13_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/11790754_6","volume-title":"Detection of Intrusions and Malware & Vulnerability Assessment","author":"C. Mulliner","year":"2006","unstructured":"Mulliner, C., Vigna, G., Dagon, D., Lee, W.: Using labeling to prevent cross-service attacks against smart phones. In: B\u00fcschkes, R., Laskov, P. (eds.) DIMVA 2006. LNCS, vol.\u00a04064, pp. 91\u2013108. Springer, Heidelberg (2006)"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Park, S., Savvides, A., Srivastava, M.: Battery capacity measurement and analysis using lithium coin cell battery. In: Proceedings of ISLPED (August 2001)","DOI":"10.1145\/383082.383187"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Racic, R., Ma, D., Chen, H.: Exploiting mms vulnerabilities to stealthily exhaust mobile phone\u2019s battery. In: Proceedings of SecureComm 2006 (August 2006)","DOI":"10.1109\/SECCOMW.2006.359550"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Sarat, S., Terzis, A.: On the detection and origin identification of mobile worms. In: Proceedings of WORMS, Alexandria, VA (November 2007)","DOI":"10.1145\/1314389.1314401"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Simunic, T., Benini, L., Micheli, G.: Energy-efficient design of battery-powered embedded systems. In: Proceedings of ISLPED (August 1999)","DOI":"10.1145\/313817.313928"},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"Su, J., Chan, K., Miklas, A., Po, K., Akhavan, A., Saroiu, S., Lara, E., Goel, A.: A preliminary investigation of worm infections in a bluetooth environment. In: Proceedings of WORM (2006)","DOI":"10.1145\/1179542.1179545"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Traynor, P., Enck, W., McDaniel, P., Porta, T.: Mitigating attacks on open functionality in sms-capable cellular networks. In: Proceedings of Mobicom 2006 (2006)","DOI":"10.1145\/1161089.1161111"},{"key":"13_CR31","doi-asserted-by":"crossref","unstructured":"Venugopal, D., Hu, G., Roman, N.: Intelligent virus detection on mobile devices. In: Proceedings of ACM PST, Markham, Ontario, Canada (October 2006)","DOI":"10.1145\/1501434.1501511"},{"key":"13_CR32","doi-asserted-by":"crossref","unstructured":"Yan, G., Eidenbenz, S.: Modeling propagation dynamics of bluetooth worms. In: Proceedings of ICDCS 2007 (2007)","DOI":"10.1109\/ICDCS.2007.121"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04342-0_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T22:11:37Z","timestamp":1558563097000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04342-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642043413","9783642043420"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04342-0_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}