{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:20:51Z","timestamp":1742973651505,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642123672"},{"type":"electronic","value":"9783642123689"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12368-9_3","type":"book-chapter","created":{"date-parts":[[2010,4,7]],"date-time":"2010-04-07T10:30:40Z","timestamp":1270636240000},"page":"31-46","source":"Crossref","is-referenced-by-count":9,"title":["A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones"],"prefix":"10.1007","author":[{"given":"Tansu","family":"Alpcan","sequence":"first","affiliation":[]},{"given":"Christian","family":"Bauckhage","sequence":"additional","affiliation":[]},{"given":"Aubrey-Derrick","family":"Schmidt","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Agarwal, S.: Ranking on Graph Data. In: Proc. Int. Conf. on Machine Learning, ICML, pp. 25\u201332 (2006)","DOI":"10.1145\/1143844.1143848"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Alpcan, T., Ba\u015far, T.: A game theoretic analysis of intrusion detection in access control systems. In: Proc. IEEE Conf. Decision and Control, pp. 1568\u20131573 (2004)","DOI":"10.1109\/CDC.2004.1430267"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Axelsson, S.: The base-rate fallacy and its implications for the difficulty of intrusion detection. In: Proc. ACM Conf. on Computer and Communications Security, pp. 1\u20137 (1999)","DOI":"10.1145\/319709.319710"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Bloem, M., Alpcan, T., Ba\u015far, T.: An optimal control approach to malware filtering. In: Proc. 46th IEEE Conference on Decision and Control, New Orleans, LA (December 2007)","DOI":"10.1109\/CDC.2007.4434520"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Bloem, M., Alpcan, T., Schmidt, S., Ba\u015far, T.: Malware filtering for network security using weighted optimality measures. In: IEEE Conference on Control Applicatons (CCA), Singapore (October 2007)","DOI":"10.1109\/CCA.2007.4389246"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-540-76627-8_6","volume-title":"Stabilization, Safety, and Security of Distributed Systems","author":"R. Bye","year":"2007","unstructured":"Bye, R., Luther, K., Camtepe, S.A., Alpcan, T., Albayrak, S., Yener, B.: Decentralized detector generation in cooperative intrusion detection systems. In: Masuzawa, T., Tixeuil, S. (eds.) SSS 2007. LNCS, vol.\u00a04838, pp. 37\u201351. Springer, Heidelberg (2007)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Cheng, J., Wong, S.H.Y., Yang, H., Lu, S.: Smartsiren: virus detection and alert for smartphones. In: Proc. of Int. Conf. on Mobile Systems, Applications, and Services (Mobisys 2007), pp. 258\u2013271 (2007)","DOI":"10.1145\/1247660.1247690"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Jha, S., Seshia, S., Song, D., Bryant, R.: Semantics-Aware Malware Detection. In: Proc. IEEE Symp. on Security and Privacy, pp. 32\u201346 (2005)","DOI":"10.1109\/SP.2005.20"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Coursen, S.: The future of mobile malware. Network Security\u00a0(8), 7\u201311 (August 2007)","DOI":"10.1016\/S1353-4858(07)70072-7"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Dalal, N., Triggs, B.: Histograms of Oriented Gradients for Human Detection. In: Proc. CVPR, vol.\u00a02, pp. 886\u2013893 (2005)","DOI":"10.1109\/CVPR.2005.177"},{"issue":"4","key":"3_CR11","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s00779-005-0046-3","volume":"10","author":"N. Eagle","year":"2006","unstructured":"Eagle, N., Pentland, A.S.: Reality mining: sensing complex social systems. Personal Ubiquitous Computing\u00a010(4), 255\u2013268 (2006)","journal-title":"Personal Ubiquitous Computing"},{"issue":"3","key":"3_CR12","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1109\/TKDE.2007.46","volume":"19","author":"F. Fouss","year":"2007","unstructured":"Fouss, F., Pirotte, A., Renders, J.M., Saerens, M.: Random-Walk Computation of Similarities between Nodes of a Graph with Application to Collaborative Recommendation. IEEE Trans. on Knowledge and Data Engineering\u00a019(3), 355\u2013369 (2007)","journal-title":"IEEE Trans. on Knowledge and Data Engineering"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Gao, B., Liu, T.Y., Ma, W.Y.: Star-Structured Higher-Order Heterogeneous Data Co-Clustering Based on Consistent Information Theory. In: Proc. ICDM, pp. 880\u2013884 (2006)","DOI":"10.1109\/ICDM.2006.154"},{"key":"3_CR14","unstructured":"Idika, N., Mathur, A.: A Survey of Malware Detection Techniques. Tech. Rep. SERC-TR-286, Software Engineering Research Center (March 2007)"},{"key":"3_CR15","doi-asserted-by":"crossref","first-page":"155","DOI":"10.7551\/mitpress\/4057.003.0010","volume-title":"Kernel Methods in Computational Biology","author":"H. Kashima","year":"2004","unstructured":"Kashima, H., Tsuda, K., Inokuchi, A.: Kernels for graphs. In: Sch\u00f6lkopf, B., Tsuda, K., Vert, J.P. (eds.) Kernel Methods in Computational Biology, pp. 155\u2013170. MIT Press, Cambridge (2004)"},{"key":"3_CR16","unstructured":"Kondor, R., Lafferty, J.: Diffusion Kernels on Graphs and Other Discrete Input Spaces. In: Proc. ICML, pp. 315\u2013322 (2002)"},{"issue":"1","key":"3_CR17","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1137\/S0036144503424786","volume":"47","author":"A. Langville","year":"2005","unstructured":"Langville, A., Meyer, C.: A Survey of Eigenvector Methods for Web Information Retrieval. SIAM Review\u00a047(1), 135\u2013161 (2005)","journal-title":"SIAM Review"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Luther, K., Bye, R., Alpcan, T., Muller, A., Albayrak, S.: A cooperative AIS framework for intrusion detection. In: Proc. of the IEEE Conference on Communication (ICC), Glasgow, Scotland, June 2007, pp. 1409\u20131416 (2007)","DOI":"10.1109\/ICC.2007.237"},{"volume-title":"Machine Learning and Data Mining for Computer Security","year":"2006","key":"3_CR19","unstructured":"Maloof, M. (ed.): Machine Learning and Data Mining for Computer Security. Springer, Heidelberg (2006)"},{"key":"3_CR20","unstructured":"Messmer, E.: New approaches to malware detection coming into view. Network World (April 2007), http:\/\/www.networkworld.com\/news\/2007\/042507-malware-detection.html"},{"key":"3_CR21","first-page":"72","volume-title":"Proc. of 20th Intl. Conf. on Advanced Information Networking and Applications (AINA\u201906)","author":"M. Miettinen","year":"2006","unstructured":"Miettinen, M., Halonen, P.: Host-based intrusion detection for advanced mobile devices. In: Proc. of 20th Intl. Conf. on Advanced Information Networking and Applications (AINA\u201906), vol.\u00a02, pp. 72\u201376. IEEE Computer Society, Washington (2006)"},{"key":"3_CR22","volume-title":"Introduction to Modern Information Retrieval","author":"G. Salton","year":"1983","unstructured":"Salton, G.: Introduction to Modern Information Retrieval. McGraw-Hill, New York (1983)"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Schmidt, A.D., Peters, F., Lamour, F., Albayrak, \u015e.: Monitoring smartphones for anomaly detection. In: Proc. of First Int. Conf. on Mobile Wireless Middleware, Operating Systems, and Applications (MOBILWARE 2008) (February 2008)","DOI":"10.4108\/ICST.MOBILWARE2008.2492"},{"key":"3_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89173-4_26","volume-title":"Critical Information Infrastructures Security","author":"S. Schmidt","year":"2008","unstructured":"Schmidt, S., Alpcan, T., Albayrak, S., Ba\u015far, T., Muller, A.: A malware detector placement game for intrusion detection. In: Lopez, J., H\u00e4mmerli, B.M. (eds.) CRITIS 2007. LNCS, vol.\u00a05141. Springer, Heidelberg (2008)"},{"key":"3_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-540-30143-1_11","volume-title":"Recent Advances in Intrusion Detection","author":"K. Wang","year":"2004","unstructured":"Wang, K., Stolfo, S.: Anomalous Payload-Based Network Intrusion Detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol.\u00a03224, pp. 203\u2013222. Springer, Heidelberg (2004)"},{"issue":"1","key":"3_CR26","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/j.dss.2005.01.005","volume":"42","author":"N. Wu","year":"2006","unstructured":"Wu, N., Zhang, J.: Factor-analysis Based Anomaly Detection and Clustering. Decision Support Systems\u00a042(1), 375\u2013389 (2006)","journal-title":"Decision Support Systems"},{"key":"3_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/11527725_7","volume-title":"Web and Communication Technologies and Internet-Related Social Issues - HSI 2005","author":"T.S. Yap","year":"2005","unstructured":"Yap, T.S., Ewe, H.T.: A mobile phone malicious software detection model with behavior checker. In: Shimojo, S., Ichii, S., Ling, T.-W., Song, K.-H. (eds.) HSI 2005. LNCS, vol.\u00a03597, pp. 57\u201365. Springer, Heidelberg (2005)"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Zhou, D., Weston, J., Gretton, A., Bousquet, O., Sch\u00f6lkopf, B.: Ranking on Data Manifolds. In: Proc. NIPS, pp. 169\u2013176 (2004)","DOI":"10.1007\/11494669_23"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12368-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T21:48:32Z","timestamp":1740001712000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12368-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642123672","9783642123689"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12368-9_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}