{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T06:52:52Z","timestamp":1725691972604},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642315879"},{"type":"electronic","value":"9783642315886"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31588-6_33","type":"book-chapter","created":{"date-parts":[[2012,7,21]],"date-time":"2012-07-21T02:21:58Z","timestamp":1342837318000},"page":"252-259","source":"Crossref","is-referenced-by-count":0,"title":["Method of Smartphone Users\u2019 Information Protection Based on Composite Behavior Monitor"],"prefix":"10.1007","author":[{"given":"Hua","family":"Zha","sequence":"first","affiliation":[]},{"given":"Chunlin","family":"Peng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Statistical report of the global mobile phone (OL) (2012), \n                    \n                      http:\/\/www.199it.com\/archives\/23609.html","key":"33_CR1"},{"unstructured":"Cheng, Z.: Mobile Malware: Threats and Prevention, McAfee Avert Labs (2008)","key":"33_CR2"},{"doi-asserted-by":"crossref","unstructured":"Yap, T.S., Ewe, H.T.: A Mobile Phone Malicious Software Detection Model with Behavior Checker. In: Proc. of HIS 2005, pp. 57\u201365 (2005)","key":"33_CR3","DOI":"10.1007\/11527725_7"},{"unstructured":"Szor, P.: The Art of Computer Virus Research and Defense. Addison Wesley Professional (2005)","key":"33_CR4"},{"issue":"9","key":"33_CR5","first-page":"1089","volume":"25","author":"Z.H. Wang","year":"2006","unstructured":"Wang, Z.H., Wang, H.F.: Study on Anti-Virus Engine Based on Heuristic Search of Polymorphic Virus Behavior. Research and Exploration in Laboratory\u00a025(9), 1089\u20131091 (2006)","journal-title":"Research and Exploration in Laboratory"},{"issue":"1","key":"33_CR6","first-page":"35","volume":"32","author":"J.J. Wu","year":"2010","unstructured":"Wu, J.J., Fang, M.W., Zhang, X.F.: Research of Mobile Phone Virus Defense Based on Heuristic Behavior-Checking. Computer Engineering and Science\u00a032(1), 35\u201338 (2010)","journal-title":"Computer Engineering and Science"},{"issue":"3","key":"33_CR7","first-page":"167","volume":"15","author":"P. Cui","year":"2008","unstructured":"Cui, P.: Application of Formal Semantics to Heuristic Anti-virus Engine. Journal of Liaodong University (Natural Sciences)\u00a015(3), 167\u2013171 (2008)","journal-title":"Journal of Liaodong University (Natural Sciences)"},{"issue":"17","key":"33_CR8","first-page":"64","volume":"45","author":"Y.T. Hu","year":"2009","unstructured":"Hu, Y.T., Chen, G., Zheng, N., Guo, Y.H.: Malicious Executable Detection Based on Run-time Behavior. Computer Engineering and Applications\u00a045(17), 64\u201366 (2009)","journal-title":"Computer Engineering and Applications"},{"issue":"11","key":"33_CR9","first-page":"1936","volume":"27","author":"B.Y. Zhang","year":"2006","unstructured":"Zhang, B.Y., Yin, J.P., Tang, W.S.: Study and Implementation Intelligent Detection System to Recognize Unknown Computer Virus. Computer Engineering and Design\u00a027(11), 1936\u20131938 (2006)","journal-title":"Computer Engineering and Design"},{"key":"33_CR10","first-page":"41","volume":"9","author":"X.L. Liu","year":"2008","unstructured":"Liu, X.L., Liu, K.: Principle of Malware Analysis and Study of Protective Measures on Windows Mobile Phone. Network Security Technology & Application\u00a09, 41\u201343 (2008)","journal-title":"Network Security Technology & Application"}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31588-6_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:14:08Z","timestamp":1620130448000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31588-6_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642315879","9783642315886"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31588-6_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}