{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T15:36:12Z","timestamp":1725896172758},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642291531"},{"type":"electronic","value":"9783642291548"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29154-8_3","type":"book-chapter","created":{"date-parts":[[2012,4,20]],"date-time":"2012-04-20T23:18:00Z","timestamp":1334963880000},"page":"26-38","source":"Crossref","is-referenced-by-count":17,"title":["Mirroring Smartphones for Good: A Feasibility Study"],"prefix":"10.1007","author":[{"given":"Bo","family":"Zhao","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhi","family":"Xu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Caixia","family":"Chi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sencun","family":"Zhu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Guohong","family":"Cao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N.: The case for vm-based cloudlets in mobile computing. IEEE Pervasive Computing (2009)","DOI":"10.1109\/MPRV.2009.82"},{"key":"3_CR2","unstructured":"Chun, B.-G., Maniatis, P.: Augmented smart phone applications through clone cloud execution. In: Proc. HotOS XII (2009)"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Oberheide, J., Veeraraghavan, K., Cooke, E., Flinn, J., Jahanian, F.: Virtualized in-cloud security services for mobile devices. In: Proc. MobiVirt (2008)","DOI":"10.1145\/1622103.1629656"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Zhang, X., Schiffman, J., Gibbs, S., Kunjithapatham, A., Jeong, S.: Securing elastic applications on mobile devices for cloud computing. In: Proc. CCSW (2009)","DOI":"10.1145\/1655008.1655026"},{"key":"3_CR5","unstructured":"Oberheide, J., Cooke, E., Jahanian, F.: Cloudav: N-version antivirus in the network cloud. In: Proc. Security Symposium Conference, SS (2008)"},{"key":"3_CR6","unstructured":"3GPP Specification TS 23.107: Quality of Service (QoS) concept and architecture, Std., Rev. Rel. 8, \n                    \n                      http:\/\/www.3gpp.org"},{"key":"3_CR7","unstructured":"Zhao, B., Xu, Z., Chi, C., Zhu, S., Cao, G.: Mirroring smartphones for good: A feasibility study. Tech. Rep. (2010), \n                    \n                      www.cse.psu.edu\/~bzhao\/mirror_report.pdf"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Zhu, Z., Cao, G., Zhu, S., Ranjan, S., Nucci, A.: A social network based patching scheme for worm containment in cellular networks. In: Proc. IEEE INFOCOM (2009)","DOI":"10.1109\/INFCOM.2009.5062064"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Zhao, B., Chi, C., Gao, W., Zhu, S., Cao, G.: A chain reaction dos attack on 3G networks: Analysis and defenses. In: Proc. IEEE INFOCOM (2009)","DOI":"10.1109\/INFCOM.2009.5062173"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Jiang, X., Wang, X., Xu, D.: Stealthy malware detection through vmm-based \u201dout-of-the-box\u201d semantic view reconstruction. In: Proc. CCS (2007)","DOI":"10.1145\/1315245.1315262"},{"key":"3_CR11","unstructured":"Openvz, \n                    \n                      en.wikipedia.org\/wiki\/OpenVZ"},{"key":"3_CR12","unstructured":"Smobile virusguard for google android, \n                    \n                      http:\/\/www.smobilesystems.com"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile and Ubiquitous Systems: Computing, Networking, and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29154-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T07:05:53Z","timestamp":1556694353000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29154-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642291531","9783642291548"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29154-8_3","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}