{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:17:54Z","timestamp":1725578274717},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642193750"},{"type":"electronic","value":"9783642193767"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19376-7_12","type":"book-chapter","created":{"date-parts":[[2011,2,17]],"date-time":"2011-02-17T06:46:54Z","timestamp":1297925214000},"page":"138-149","source":"Crossref","is-referenced-by-count":26,"title":["Detection of Malicious Applications on Android OS"],"prefix":"10.1007","author":[{"given":"Francesco","family":"Di Cerbo","sequence":"first","affiliation":[]},{"given":"Andrea","family":"Girardello","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Michahelles","sequence":"additional","affiliation":[]},{"given":"Svetlana","family":"Voronkova","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Funambol inc.: Funambol Open Source Mobile Cloud Sync and Push Email, \n                    \n                      http:\/\/www.funambol.com"},{"key":"12_CR2","unstructured":"Microsoft: ActiveSync, Windows Phone Synchronization, \n                    \n                      http:\/\/www.microsoft.com\/windowsmobile\/en-us\/help\/synchronize\/device-synch.mspx"},{"key":"12_CR3","unstructured":"Apple inc.: Apple - MobileMe, \n                    \n                      http:\/\/www.apple.com\/mobileme\/"},{"key":"12_CR4","unstructured":"Scientific Working Groups on Digital Evidence and Imaging Technology: Combined Master Glossary of Terms (retrieved on July 2, 2010)"},{"key":"12_CR5","unstructured":"Robbins, J.: An Explanation of Computer Forensics, PC Software Forensics, \n                    \n                      http:\/\/www.computerforensics.net\/forensics.htm\n                    \n                    \n                   (retrieved on July 2, 2010)"},{"key":"12_CR6","unstructured":"Jansen, W., Ayers, R.: Guidelines on Cell Phone Forensics. NIST Special Publication 800-101 (2007), \n                    \n                      http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-101\/SP800-101.pdf\n                    \n                    \n                   (retrieved on July 2, 2010)"},{"key":"12_CR7","unstructured":"Kim, K., Hong, D., Chung, K., Ryou, J.: Data Acquisition from Cell Phone using Logical Approach. Proceedings of the World Academy of Science, Engineering and Technology\u00a026 (2007)"},{"key":"12_CR8","unstructured":"Rizwan, A., Dharaskar, R.V.: Mobile Forensics: an Overview, Tools, Future trendsand Challenges from Law Enforcement perspective, \n                    \n                      http:\/\/www.iceg.net\/2008\/books\/2\/34_312-323.pdf\n                    \n                    \n                   (retrieved on July 2, 2010)"},{"key":"12_CR9","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/1113034.1113069","volume":"49","author":"B.D. Carrier","year":"2006","unstructured":"Carrier, B.D.: Risks of live digital forensic analysis. Commun. ACM.\u00a049, 56\u201361 (2006)","journal-title":"Commun. ACM."},{"key":"12_CR10","unstructured":"Open Handset Alliance: Android, \n                    \n                      http:\/\/www.openhandsetalliance.com\/android_overview.html\n                    \n                    \n                   (retrieved on July 2, 2010)"},{"key":"12_CR11","unstructured":"Android Community: What is Android?, \n                    \n                      http:\/\/developer.android.com\/guide\/basics\/what-is-android.html\n                    \n                    \n                   (retrieved on July 2, 2010)"},{"key":"12_CR12","unstructured":"Vennon, T.: Android Malware, A Study of Known and Potential Malware Threats, \n                    \n                      http:\/\/threatcenter.smobilesystems.com\/wp-content\/plugins\/download-monitor\/download.php?id=6\n                    \n                    \n                   (published February 24, 2010)"},{"key":"12_CR13","unstructured":"Vennon, T., Stroop, D.: Android Malware, A Study of Known and Potential Malware Threats, June 21 (2010), \n                    \n                      http:\/\/threatcenter.smobilesystems.com\/wp-content\/uploads\/2010\/06\/Android-Market-Threat-Analysis-6-22-10-v1.pdf\n                    \n                    \n                   (published June 21, 2010)"},{"key":"12_CR14","unstructured":"Girardello, A., Michahelles, F.: Explicit and Implicit Ratings for Mobile Applications. In: 3. Workshop Digitale Soziale Netze and der 40. Jahrestagung der Gesellshaft fr Informatik, Leipzig (September 2010)"},{"key":"12_CR15","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M. Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. SIGKDD Explor. Newsl.\u00a011, 110\u2013118 (2009)","journal-title":"SIGKDD Explor. Newsl."},{"key":"12_CR16","unstructured":"Oberheide, J.: Remote Kill and Install on Google Android, \n                    \n                      http:\/\/jon.oberheide.org\/blog\/2010\/06\/25\/remote-kill-and-install-on-google-android\/\n                    \n                    \n                   (retrieved on July 2, 2010)"},{"key":"12_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/3-540-44801-2_8","volume-title":"Data Warehousing and Knowledge Discovery","author":"S. Orlando","year":"2001","unstructured":"Orlando, S., Palmerini, P., Perego, R.: Enhancing the apriori algorithm for frequent set counting. In: Kambayashi, Y., Winiwarter, W., Arikawa, M. (eds.) DaWaK 2001. LNCS, vol.\u00a02114, pp. 71\u201382. Springer, Heidelberg (2001)"},{"key":"12_CR18","unstructured":"Garca, E., Romero, C.: Drawbacks and solutions of applying association rule mining in learning management systems. In: Proceedings of the International Workshop on Applying Data Mining in e-Learning (ADML 2007), pp. 14\u201322 (2007)"},{"key":"12_CR19","volume-title":"Pattern classification","author":"R.O. Duda","year":"2001","unstructured":"Duda, R.O., Hart, P.E., et al.: Pattern classification. Wiley-Interscience, Hoboken (2001)"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Moser, R., Pedrycz, W., et al.: A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction. In: Proceedings of the 30th International Conference on Software Engineering, pp. 181\u2013190 (2008)","DOI":"10.1145\/1368088.1368114"}],"container-title":["Lecture Notes in Computer Science","Computational Forensics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19376-7_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T08:20:13Z","timestamp":1558426813000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19376-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642193750","9783642193767"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19376-7_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}