{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,14]],"date-time":"2025-02-14T05:20:05Z","timestamp":1739510405305,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642108464"},{"type":"electronic","value":"9783642108471"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10847-1_7","type":"book-chapter","created":{"date-parts":[[2009,11,28]],"date-time":"2009-11-28T03:33:01Z","timestamp":1259379181000},"page":"51-56","source":"Crossref","is-referenced-by-count":0,"title":["The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device"],"prefix":"10.1007","author":[{"given":"Bo-heung","family":"Chung","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Min-ho","family":"Han","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ki-young","family":"Kim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/0022-2836(81)90087-5","volume":"147","author":"T.F. Smith","year":"1981","unstructured":"Smith, T.F., Waterman, M.S.: Identification of Common Molecular Subsequences. J. Mol. Biol.\u00a0147, 195\u2013197 (1981)","journal-title":"J. Mol. Biol."},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Shi, Z., Ji, Z., Hu, M.: A Novel Distributed Intrusion Detection Model Based on Mobile Agent. In: ACM InfoSecu 2004, pp. 155\u2013159 (2006)","DOI":"10.1145\/1046290.1046322"},{"key":"7_CR3","unstructured":"Yong-guang, Z., Wenke, L., Yi-an, H.: Intrusion Detection Technique for Mobile Wireless Networks. In: ACM MONET, pp. 545\u2013556 (2003)"},{"key":"7_CR4","unstructured":"Deepak, V.: An Efficient Signature Representation and Matching Method for Mobile Devices. In: Proceedings of the 2nd annual international workshop on Wireless internet, vol.\u00a0220 (2006)"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Geetha, R., Delbert, H.: A P2P Intrusion Detection System based on Mobile Agents. In: ACM ACME 2004, pp. 185\u2013195 (2004)","DOI":"10.1145\/986537.986581"},{"key":"7_CR6","unstructured":"National Center for Biotechnology Information, http:\/\/www.ncbi.nlm.nih.gov"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Yogesh Prem, S., Hannes, T.: Protecting Mobile Devices from TCP Flooding Attacks. In: ACM mobiArch 2006, pp. 63\u201368 (2006)","DOI":"10.1145\/1186699.1186717"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Benjamin, H.: Mobile Device Security. In: ACM InfoSecCD Conference 2004, pp. 99\u2013101 (2004)","DOI":"10.1145\/1059524.1059545"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","first-page":"15","volume-title":"Digital Watermarking","author":"J. Ingemar","year":"2005","unstructured":"Ingemar, J., Ton, K., Georg, P., Mathias, S.: Information Transmission and Steganography. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol.\u00a03710, pp. 15\u201329. Springer, Heidelberg (2005)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"David, C., Sebastian, H., Pasquale, M.: Quantitative Analysis of the Leakage of Confidential Data. Electronic Notes in Theoretical Computer Science\u00a059(3) (2003)","DOI":"10.1016\/S1571-0661(04)00290-7"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1007\/BFb0028154","volume-title":"Information Hiding","author":"C. Christian","year":"1998","unstructured":"Christian, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 306\u2013318. Springer, Heidelberg (1998)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Dan, B., James, S.: Collusion-Secure Fingerprinting for Digital Data. IEEE Transactions on Information Theory\u00a044(5) (September 1998)","DOI":"10.1109\/18.705568"}],"container-title":["Communications in Computer and Information Science","Security Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10847-1_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T13:21:40Z","timestamp":1739452900000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10847-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642108464","9783642108471"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10847-1_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}