{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T02:54:15Z","timestamp":1725677655846},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642302435"},{"type":"electronic","value":"9783642302442"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30244-2_1","type":"book-chapter","created":{"date-parts":[[2012,4,28]],"date-time":"2012-04-28T12:55:50Z","timestamp":1335617750000},"page":"1-12","source":"Crossref","is-referenced-by-count":7,"title":["Android Market Analysis with Activation Patterns"],"prefix":"10.1007","author":[{"given":"Peter","family":"Teufl","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Kraxberger","sequence":"additional","affiliation":[]},{"given":"Clemens","family":"Orthacker","sequence":"additional","affiliation":[]},{"given":"G\u00fcnther","family":"Lackner","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Gissing","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Marsalek","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Leibetseder","sequence":"additional","affiliation":[]},{"given":"Oliver","family":"Prevenhueber","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"1_CR1","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1023\/A:1006569829653","volume":"11","author":"F. Crestani","year":"1997","unstructured":"Crestani, F.: Application of spreading activation techniques in information retrieval. Artificial Intelligence Review\u00a011(6), 453\u2013482 (1997)","journal-title":"Artificial Intelligence Review"},{"key":"1_CR2","unstructured":"Fritzke, B.: A growing neural gas learns topologies. Advances in Neural Information Processing Systems\u00a0(1), 1211\u20131216 (2005)"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/978-3-642-17619-7_7","volume-title":"Cryptology and Network Security","author":"G. Lackner","year":"2010","unstructured":"Lackner, G., Teufl, P., Weinberger, R.: User Tracking Based on Behavioral Fingerprints. In: Heng, S.-H., Wright, R.N., Goi, B.-M. (eds.) CANS 2010. LNCS, vol.\u00a06467, pp. 76\u201395. Springer, Heidelberg (2010)"},{"issue":"8-9","key":"1_CR4","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1016\/S0893-6080(04)00166-2","volume":"17","author":"A.K. Qin","year":"2004","unstructured":"Qin, A.K., Suganthan, P.N.: Robust growing neural gas algorithm with application in cluster analysis. Neural Netw.\u00a017(8-9), 1135\u20131148 (2004)","journal-title":"Neural Netw."},{"key":"1_CR5","unstructured":"Quillian, M.R.: Semantic Memory, vol.\u00a02, ch.10, pp. 227\u2013270. MIT Press (1968)"},{"key":"1_CR6","unstructured":"Teufl, P., Lackner, G.: RDF Data Analysis with Activation Patterns. In: Und Hermann Maurer, K.T. (ed.) Proceedings of the 10th International Conference on Knowledge Management and Knowledge Technologies, iKNOW 2010 Graz Austria, Journal of Computer Science (2010)"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Teufl, P., Payer, U., Fellner, R.: Event correlation on the basis of activation patterns. In: Proceedings of the 18th Euromicro Conference on Parallel Distributed and NetworkBased Processing, PDP 2010, pp. 631\u2013640 (2010)","DOI":"10.1109\/PDP.2010.80"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-642-03781-8_13","volume-title":"Electronic Participation","author":"P. Teufl","year":"2009","unstructured":"Teufl, P., Payer, U., Parycek, P.: Automated Analysis of e-Participation Data by Utilizing Associative Networks, Spreading Activation and Unsupervised Learning. In: Macintosh, A., Tambouris, E. (eds.) ePart 2009. LNCS, vol.\u00a05694, pp. 139\u2013150. Springer, Heidelberg (2009)"},{"issue":"2","key":"1_CR9","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MPRV.2009.39","volume":"8","author":"A. Toninelli","year":"2009","unstructured":"Toninelli, A., Montanari, R., Lassila, O., Khushraj, D.: What\u2019s on Users\u2019 Minds? Toward a Usable Smart Phone Security Model. IEEE Pervasive Computing\u00a08(2), 32\u201339 (2009)","journal-title":"IEEE Pervasive Computing"},{"key":"1_CR10","unstructured":"Vennon, T., Stroop, D.: Android Market: Threat Analysis of the Android Market (2010)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Mobile Information and Communication Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30244-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T01:27:10Z","timestamp":1556760430000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30244-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642302435","9783642302442"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30244-2_1","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}