{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T14:41:11Z","timestamp":1774190471113,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2008,11,11]],"date-time":"2008-11-11T00:00:00Z","timestamp":1226361600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2009,2]]},"DOI":"10.1007\/s11036-008-0113-x","type":"journal-article","created":{"date-parts":[[2008,11,10]],"date-time":"2008-11-10T13:36:02Z","timestamp":1226324162000},"page":"92-106","source":"Crossref","is-referenced-by-count":67,"title":["Monitoring Smartphones for Anomaly Detection"],"prefix":"10.1007","volume":"14","author":[{"given":"Aubrey-Derrick","family":"Schmidt","sequence":"first","affiliation":[]},{"given":"Frank","family":"Peters","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Lamour","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Scheel","sequence":"additional","affiliation":[]},{"given":"Seyit Ahmet","family":"\u00c7amtepe","sequence":"additional","affiliation":[]},{"given":"\u015eahin","family":"Albayrak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,11,11]]},"reference":[{"key":"113_CR1","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MPRV.2005.32","volume":"4","author":"GD Abowd","year":"2005","unstructured":"Abowd GD, Iftode L, Mitchel H (2005) The Smart phone: a first platform for pervasive computing. IEEE Perv Comput 4:18\u201319","journal-title":"IEEE Perv Comput"},{"key":"113_CR2","first-page":"123","volume-title":"Proceedings of international conference on computational intelligence for modelling control and automation (CIMCA 2005)","author":"S Albayrak","year":"2005","unstructured":"Albayrak S, Scheel C, Milosevic D, M\u00fcller A (2005) Combining self-organizing map algorithms for robust and scalable intrusion detection. In: Mohammadian M (ed) Proceedings of international conference on computational intelligence for modelling control and automation (CIMCA 2005). IEEE Computer Society, Los Alamitos, pp\u00a0123\u2013130"},{"key":"113_CR3","doi-asserted-by":"crossref","unstructured":"Allen J, Christie A, Fithen W, McHugh J, Pickel J, Stoner E (2000) State of the practice of intrusion detection technologies. Technical Report, CMU\/SEI-99-TR-028. Carnegie Mellon Software Engeneering Institue, Pittsburgh, PA, pp\u00a015213\u20133890","DOI":"10.21236\/ADA375846"},{"key":"113_CR4","unstructured":"Axelsson S (2000) Intrusion detection systems: a survey and taxonomy. Technical Report 99-15. Department of Computer Engineering Chalmers University of Technology G\u00f6teborg, Sweden"},{"key":"113_CR5","first-page":"296","volume-title":"HICSS \u201908: Proceedings of the proceedings of the 41st annual Hawaii international conference on system sciences","author":"TK Buennemeyer","year":"2008","unstructured":"Buennemeyer TK, Nelson TM, Clagett LM, Dunning JP, Marchany RC, Tront JG (2008) Mobile device profiling and intrusion detection using smart batteries. In: HICSS \u201908: Proceedings of the proceedings of the 41st annual Hawaii international conference on system sciences, p\u00a0296. IEEE Computer Society, Washington, DC. doi: 10.1109\/HICSS.2008.319"},{"key":"113_CR6","unstructured":"Bundesverband Informationswirtschaft Telekommunikation und neue Medien e.V.-BITKOM (2006) Mehr Handys als Einwohner in Deutschland. http:\/\/www.bitkom.de\/41015_40990.aspx"},{"key":"113_CR7","first-page":"475","volume-title":"Proceedings of the 26th IEEE international performance computing and communications conference, IPCCC 2007, New Orleans, 11\u201313 April 2007","author":"Y Bulygin","year":"2007","unstructured":"Bulygin Y (2007) Epidemics of mobile worms. In: Proceedings of the 26th IEEE international performance computing and communications conference, IPCCC 2007, New Orleans, 11\u201313 April 2007. IEEE Computer Society, Los Alamitos, pp\u00a0475\u2013478"},{"key":"113_CR8","unstructured":"Canalys (2006) EMEA Q3 2006\u2014Highlight From the Canalys Research. http:\/\/www.canalys.com\/pr\/2006\/r2006102.htm . http:\/\/www.canalys.com\/ (online visited 2007.10.04)"},{"key":"113_CR9","doi-asserted-by":"crossref","unstructured":"Cheng J, Wong SHY, Yang H, Lu S (2007) Smartsiren: virus detection and alert for smartphones. In: International conference on mobile systems, applications, and services (Mobisys 2007), Puerto Rico, 11\u201314 June 2007, pp.\u00a0258\u2013271","DOI":"10.1145\/1247660.1247690"},{"key":"113_CR10","first-page":"2250","volume-title":"Global telecommunications conference, 2004. GLOBECOM \u201904, vol\u00a04","author":"G Davis","year":"2004","unstructured":"Davis G, Davis N (2004) Battery-based intrusion detection. In: Global telecommunications conference, 2004. GLOBECOM \u201904, vol\u00a04. IEEE, Piscataway, pp\u00a02250\u20132255. doi: 10.1109\/GLOCOM.2004.1378409"},{"key":"113_CR11","first-page":"245","volume-title":"ICMLA \u201906: Proceedings of the 5th international conference on machine learning and applications","author":"S Deegalla","year":"2006","unstructured":"Deegalla S, Bostrom H (2006) Reducing high-dimensional data by principal component analysis vs. random projection for nearest neighbor classification. In: ICMLA \u201906: Proceedings of the 5th international conference on machine learning and applications. IEEE Computer Society, Washington, DC, pp\u00a0245\u2013250. doi: 10.1109\/ICMLA.2006.43"},{"key":"113_CR12","first-page":"202","volume-title":"Proceedings of the IEEE symposium on research in security and privacy","author":"S Forrest","year":"1994","unstructured":"Forrest S, Perelson AS, Allen L, Cherukuri R (1994) Self-nonself discrimination in a computer. In: Proceedings of the IEEE symposium on research in security and privacy. IEEE Computer Society, Silver Spring, pp\u00a0202\u2013212"},{"issue":"2","key":"113_CR13","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1162\/1063656054088503","volume":"13","author":"M Glickman","year":"2005","unstructured":"Glickman M, Balthrop J, Forrest S (2005) A machine learning evaluation of an artificial immune system. Evol Comput 13(2):179\u2013212 (2005). doi: 10.1162\/1063656054088503","journal-title":"Evol Comput"},{"key":"113_CR14","unstructured":"Gostev A (2006) Mobile malware evolution: An overview, part 1. http:\/\/www.viruslist.com\/en\/analysis?pubid=200119916"},{"key":"113_CR15","doi-asserted-by":"crossref","unstructured":"Gr\u00f6ber M (2007) Applications for Symbian. http:\/\/www.mgroeber.de\/epoc.htm (15 Aug 2007)","DOI":"10.1016\/S0300-2896(07)71174-2"},{"issue":"4","key":"113_CR16","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1162\/106365600568257","volume":"8","author":"S Hofmeyr","year":"2000","unstructured":"Hofmeyr S, Forrest S (2000) Architecture for an artificial immune system. Evol Comput J 8(4):443\u2013473. doi: 10.1162\/106365600568257","journal-title":"Evol Comput J"},{"key":"113_CR17","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1109\/ISCE.2004.1375935","volume-title":"Proceedings of the 2004 IEEE international symposium on consumer Electronics","author":"J Jamaluddin","year":"2004","unstructured":"Jamaluddin J, Zotou N, Edwards R, Coulton P (2004) Mobile phone vulnerabilities: a new generation of malware. In: Proceedings of the 2004 IEEE international symposium on consumer Electronics. IEEE, Piscataway, pp\u00a0199\u2013202"},{"key":"113_CR18","volume-title":"Self-organizing maps. Springer series in information sciences, vol\u00a030","author":"T Kohonen","year":"2001","unstructured":"Kohonen T (2001) Self-organizing maps. Springer series in information sciences, vol\u00a030, 3rd edn. Springer, Heidelberg. ISBN\u00a03\u2013540\u201367921\u20139, ISSN\u00a00720\u2013678X","edition":"3"},{"issue":"3","key":"113_CR19","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/2.989921","volume":"35","author":"G Lawton","year":"2002","unstructured":"Lawton G (2002) Open source security: opportunity or oxymoron? Comput 35(3):18\u201321. doi: 10.1109\/2.989921","journal-title":"Comput"},{"key":"113_CR20","doi-asserted-by":"crossref","unstructured":"Luther K, Bye R, Alpcan T, Albayrak S, M\u00fcller A (2007) A cooperative AIS framework for intrusion detection. In: Proceedings of the IEEE international conference on communications (ICC 2007), Glasgow, 24\u201328 June 2007","DOI":"10.1109\/ICC.2007.237"},{"key":"113_CR21","unstructured":"Microsoft Corporation (2007) Windows Mobile. http:\/\/www.microsoft.com\/germany\/windowsmobile\/default.mspx . http:\/\/www.microsoft.com\/ (online visited 2007.10.04)"},{"key":"113_CR22","first-page":"72","volume-title":"AINA \u201906: proceedings of the 20th international conference on advanced information networking and applications, vol 2 (AINA\u201906)","author":"M Miettinen","year":"2006","unstructured":"Miettinen M, Halonen P, H\u00e4t\u00f6nen K (2006) Host-based intrusion detection for advanced mobile devices. In: AINA \u201906: proceedings of the 20th international conference on advanced information networking and applications, vol 2 (AINA\u201906). IEEE Computer Society, Washington, DC, pp.\u00a072\u201376. doi: http:\/\/dx.doi.org\/10.1109\/AINA.2006.192"},{"key":"113_CR23","unstructured":"Nokia (2007) Nokia E61. http:\/\/www.nokia.co.uk\/A4221036 (15 Aug 2007)"},{"key":"113_CR24","unstructured":"Oberheide J, Cooke E, Jahanian F (2008) Cloudav: N-version antivirus in the network cloud. In: Proceedings of the 17th USENIX security symposium (Security\u201908), San Jose, 28 July\u20131 August 2008"},{"key":"113_CR25","unstructured":"Rhodes BC, Mahaffey JA, Cannady JD (2000) Multiple self-organizing maps for intrusion detection. In: 23rd National information systems security conference\u2014PROCEEDINGS, PAPERS, and SLIDE PRESENTATIONS. http:\/\/csrc.nist.gov\/nissc\/2000\/proceedings\/2000proceedings.html (2007-04-19)"},{"key":"113_CR26","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MPRV.2005.30","volume":"4","author":"G Roussos","year":"2005","unstructured":"Roussos G, March AJ, Maglavera S (2005) Enabling pervasive computing with Smart phones. IEEE Perv Comput 4:20\u201327","journal-title":"IEEE Perv Comput"},{"key":"113_CR27","unstructured":"Spafford E, Zamboni D (2000) Data collection mechanisms for intrusion detection systems. CERIAS Technical Report 2000-08. CERIAS, Purdue University, 1315 Recitation Building, West Lafayette, IN"},{"key":"113_CR28","unstructured":"Symbian Software Limited (2007) Symbian OS\u2014the mobile operating system. http:\/\/www.symbian.com (online visited 2007.10.04)"},{"key":"113_CR29","unstructured":"TNS Technology (2005) Consumer trends in mobile applications\u2014a TNS technology briefing for technology decision makers. http:\/\/www.tns-global.com\/ (online visited 2007.10.04)"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-008-0113-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-008-0113-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-008-0113-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T23:16:02Z","timestamp":1559344562000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-008-0113-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11,11]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,2]]}},"alternative-id":["113"],"URL":"https:\/\/doi.org\/10.1007\/s11036-008-0113-x","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,11,11]]}}}