{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:06:31Z","timestamp":1725541591842},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642108464"},{"type":"electronic","value":"9783642108471"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10847-1_30","type":"book-chapter","created":{"date-parts":[[2009,11,28]],"date-time":"2009-11-28T03:33:01Z","timestamp":1259379181000},"page":"242-249","source":"Crossref","is-referenced-by-count":12,"title":["Insights into Malware Detection and Prevention on Mobile Phones"],"prefix":"10.1007","author":[{"given":"Qiang","family":"Yan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yingjiu","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tieyan","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Robert","family":"Deng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"Bose, A., Hu, X., Shin, K.G., Park, T.: Behavioral detection of malware on mobile handsets. In: Proceeding of the 6th international conference on Mobile systems, applications, and services, pp. 225\u2013238 (2008)","DOI":"10.1145\/1378600.1378626"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Cheng, J., Wong, S.H., Yang, H., Lu, S.: Smartsiren: virus detection and alert for smartphones. In: Proceedings of the 5th international conference on Mobile systems, applications and services, pp. 258\u2013271 (2007)","DOI":"10.1145\/1247660.1247690"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Zhang, X., Aciicmez, O., Seifert, J.P.: Building efficient integrity measurement and attestation for mobile phone platforms. In: Proceedings of the First International Conference on Security and Privacy in Mobile Information and Communication Systems (2009)","DOI":"10.1007\/978-3-642-04434-2_7"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Muthukumaran, D., Sawani, A., Schiffman, J., Jung, B.M., Jaeger, T.: Measuring integrity on mobile phone systems. In: Proceedings of the 13th ACM symposium on Access control models and technologies, pp. 155\u2013164 (2008)","DOI":"10.1145\/1377836.1377862"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Bose, A., Shin, K.G.: On mobile viruses exploiting messaging and bluetooth services. In: Securecomm and Workshops, pp. 1\u201310 (2006)","DOI":"10.1109\/SECCOMW.2006.359562"},{"key":"30_CR6","unstructured":"Hypponen, M.: State of cell phone malware in 2007. Invited talk at the 16th usenix security symposium, Boston (2007), \n                  \n                    http:\/\/www.usenix.org\/events\/sec07\/tech\/"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Kim, H., Smith, J., Shin, K.G.: Detecting energy-greedy anomalies and mobile malware variants. In: Proceeding of the 6th international conference on Mobile systems, applications, and services, pp. 239\u2013252 (2008)","DOI":"10.1145\/1378600.1378627"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Liu, L., Yan, G., Zhang, X., Chen, S.: Virusmeter: Preventing your cellphone from spies. In: Proceedings of the 12th International Symposium On Recent Advances In Intrusion Detection (2009)","DOI":"10.1007\/978-3-642-04342-0_13"},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"Jacoby, G., Davis, N.: Battery-based intrusion detection. In: Proceedings of the Global Telecommunications Conference (2004)","DOI":"10.1109\/GLOCOM.2004.1378409"}],"container-title":["Communications in Computer and Information Science","Security Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10847-1_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T11:42:44Z","timestamp":1619782964000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10847-1_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642108464","9783642108471"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10847-1_30","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}