{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:54:38Z","timestamp":1725771278244},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_42","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:26:22Z","timestamp":1391783182000},"page":"473-484","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Cloud Based NIDPS for Smartphones"],"prefix":"10.1007","author":[{"given":"Vijay Anand","family":"Pandian","sequence":"first","affiliation":[]},{"given":"T. Gireesh","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","unstructured":"Global Internet Usage, \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/Global_Internet_usage"},{"key":"42_CR2","unstructured":"ABI Research, \n                    \n                      https:\/\/www.abiresearch.com\/press\/45-million-windows-phone-and-20-million-blackberry"},{"key":"42_CR3","unstructured":"Office for National statistics, Internet Access - Households and Individuals (2013), \n                    \n                      http:\/\/www.ons.gov.uk\/ons\/dcp171778_322713.pdf"},{"key":"42_CR4","unstructured":"Symantec Intelligence Report (November 2013), \n                    \n                      http:\/\/www.symantec.com\/connect\/blogs\/symantec-intelligence-report-november-2013"},{"key":"42_CR5","unstructured":"McAfee Threats Report: Quarter (2013), \n                    \n                      http:\/\/www.mcafee.com\/us\/resources\/reports\/rp-quarterly-threat-q2-2013.pdf"},{"key":"42_CR6","unstructured":"Thomas, R., Christoph, R.: Enhancing Mobile Device Security by Security Level Integration in a Cloud Proxy, in ThinkMind. In: The Third International Conference on Cloud Computing, GRIDs, and Virtualization, Nice, France, pp. 159\u2013168 (2012)"},{"key":"42_CR7","doi-asserted-by":"crossref","unstructured":"Zhizhong, W., Xuehai, Z., Jun, X.: A Result Fusion based Distributed Anomaly Detection System for Android Smartphones. Journal of Networks\u00a08(2) (2013)","DOI":"10.4304\/jnw.8.2.273-282"},{"issue":"2","key":"42_CR8","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/j.future.2011.04.012","volume":"28","author":"L. Jianxin","year":"2012","unstructured":"Jianxin, L., Bo, L., Tianyu, W., Jinpeng, H., et al.: CyberGuarder: A Virtualization Security Assurance Architecture for Green Cloud Computing. Future Generation Computer Systems\u00a028(2), 379\u2013390 (2012)","journal-title":"Future Generation Computer Systems"},{"issue":"14","key":"42_CR9","first-page":"40","volume":"5","author":"J. Wright","year":"2012","unstructured":"Wright, J., Dawson Jr., M.E., Omar, M.: Cyber Security and Mobile Threats: The Need For Antivirus Applications For Smart Phones. Journal of Information Systems Technology & Planning\u00a05(14), 40\u201360 (2012)","journal-title":"Journal of Information Systems Technology & Planning"},{"key":"42_CR10","doi-asserted-by":"crossref","unstructured":"Abdul, N.K., Mat Kiah, M.L., Samee, U.K., Sajjad, A.M.: Towards secure mobile cloud computing: A survey. Future Generation Computer Systems, 1278\u20131299 (2013)","DOI":"10.1016\/j.future.2012.08.003"},{"key":"42_CR11","unstructured":"Caner, K., Todd, B., Karl, A.: WallDroid: Cloud Assisted Virtualized Application Specific Firewalls for the Android OS. In: Proceedings of IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (2012)"},{"key":"42_CR12","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.cose.2013.02.002","volume":"37","author":"S. Zonouz","year":"2013","unstructured":"Zonouz, S., Amir, H., Berthier, R., Borisov, N., Sanders, W.: Secloud: A cloud-based comprehensive and lightweight security solution for smartphonesl. Elsevier on Computers & Security\u00a037, 215\u2013227 (2013)","journal-title":"Elsevier on Computers & Security"},{"key":"42_CR13","first-page":"55","volume":"39","author":"H. Xu","year":"2012","unstructured":"Xu, H., Yuan, J.: Research on Cloud Monitoring Oriented to Mobile Terminal. Computer Science\u00a039, 55\u201358 (2012)","journal-title":"Computer Science"},{"key":"42_CR14","unstructured":"Miao, C., Qinsheng, H., Fangfang, J., Qiao, D.: Research of Cloud Security Communication Firewall Based on Android Platform. In: Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (2013)"},{"key":"42_CR15","doi-asserted-by":"crossref","unstructured":"Patcha, A.: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks, 3448\u20133470 (2007)","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"42_CR16","doi-asserted-by":"crossref","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly Detection: A Survey. ACM Computing Surveys, 15\u201358 (2009)","DOI":"10.1145\/1541880.1541882"},{"key":"42_CR17","doi-asserted-by":"crossref","unstructured":"D\u2019Alconzo, A., Coluccia, A., Ricciato, F., Romirer-Maierhofer, P.: A Distribution-Based Approach to Anomaly Detection and Application to 3G Mobile Traffic in Global Telecommunications Conference (2009)","DOI":"10.1109\/GLOCOM.2009.5425651"},{"key":"42_CR18","unstructured":"Raimondo, M., Tajvidi, N.: A peaks over threshold model for change point detection by wavelets. Statistica Sinica\u00a014 (2004)"},{"issue":"5","key":"42_CR19","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1109\/TNN.2005.853414","volume":"16","author":"H. Wang","year":"2005","unstructured":"Wang, H., Zhang, D., Shin, K.: Statistical analysis of network traffic for adaptive faults detection. IEEE Trans. Neural Networks\u00a016(5), 1053\u20131063 (2005)","journal-title":"IEEE Trans. Neural Networks"},{"key":"42_CR20","doi-asserted-by":"crossref","unstructured":"Prashanth, G., Prashanth, V., Jayashree, P., Srinivasan, N.: Using random forests for network-based anomaly detection. In: IEEE ICSCN 2008, Chennai, India, pp. 93\u201396 (2008)","DOI":"10.1109\/ICSCN.2008.4447167"},{"key":"42_CR21","unstructured":"Shon, T., Kim, Y., Lee, C., Moon, J.: A machine learning framework for network anomaly detection using SVM and GA. In: IEEE Workshop on Information Assurance and Security. US Military Academy, West Point (2005)"},{"key":"42_CR22","doi-asserted-by":"crossref","unstructured":"Li, Y., Guo, L.: An efficient network anomaly detection scheme based on TCM-KNN algorithm and data reduction mechanism. In: IEEE Workshop on Information Assurance and Security. US Military Academy, West Point (2007)","DOI":"10.1109\/IAW.2007.381936"},{"key":"42_CR23","doi-asserted-by":"crossref","unstructured":"Sentz, K., Ferson, S.: Combination of Evidence in Dempster-Shafer theory in SAND, pp. 0835 (2002)","DOI":"10.2172\/800792"},{"key":"42_CR24","unstructured":"Cloud Computing, \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/Cloud_computing"},{"key":"42_CR25","unstructured":"Google, Android: Security Vulnerabilities, \n                    \n                      http:\/\/www.cvedetails.com\/vulnerability-list\/vendor_id-1224\/product_id-19997\/Google-Android.html"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T06:12:04Z","timestamp":1558851124000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_42","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}