{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T14:56:23Z","timestamp":1770994583775,"version":"3.50.1"},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,2,18]],"date-time":"2019-02-18T00:00:00Z","timestamp":1550448000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s11036-019-01220-y","type":"journal-article","created":{"date-parts":[[2019,2,18]],"date-time":"2019-02-18T07:58:05Z","timestamp":1550476685000},"page":"164-172","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":43,"title":["An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6526-7334","authenticated-orcid":false,"given":"Jos\u00e9","family":"Ribeiro","sequence":"first","affiliation":[]},{"given":"Firooz B.","family":"Saghezchi","sequence":"additional","affiliation":[]},{"given":"Georgios","family":"Mantas","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Rodriguez","sequence":"additional","affiliation":[]},{"given":"Simon J.","family":"Shepherd","sequence":"additional","affiliation":[]},{"given":"Raed A.","family":"Abd-Alhameed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,18]]},"reference":[{"issue":"1","key":"1220_CR1","first-page":"446","volume":"15","author":"L Polla","year":"2013","unstructured":"Polla L, Martinelli F, Sgandurra D (2013) \u201cA survey on security for Mobile devices,\u201d communications surveys & tutorials. IEEE 15(1):446\u2013471","journal-title":"IEEE"},{"key":"1220_CR2","doi-asserted-by":"crossref","unstructured":"Becher M, Freiling FC, Hoffmann J, Holtz T, Uellenbeck S, Wolf C (2011) \u201cMobile security catching up? Revealing the nuts and bolts of the security of mobile devices,\u201d In Security and Privacy (SP), pp. 96-111. IEEE","DOI":"10.1109\/SP.2011.29"},{"key":"1220_CR3","doi-asserted-by":"crossref","unstructured":"Mantas G, Komninos N, Rodriguez J, Logota E, Marques H (2015) \u201cSecurity for 5G Communications,\u201d Eds., John Wiley & sons, Ltd, Chichester, 207\u2013220","DOI":"10.1002\/9781118867464.ch9"},{"key":"1220_CR4","doi-asserted-by":"crossref","unstructured":"Arabo A, Pranggono B (2013) \u201cMobile Malware and Smart Devices Security: Trends, Challenges and Solutions,\u201d Control Systems and Computer (CSCS), 2013 19th International Conference, pp. (526\u2013531). IEEE","DOI":"10.1109\/CSCS.2013.27"},{"issue":"1","key":"1220_CR5","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s10844-010-0148-x","volume":"38","author":"A Shabtai","year":"2012","unstructured":"Shabtai A, Kanonov U, Elovici Y, Glezer C, Weiss Y (2012) \u201cAndromaly\u201d: a behavioral malware detection framework for android devices. J Intell Inf Syst 38(1):161\u2013190","journal-title":"J Intell Inf Syst"},{"key":"1220_CR6","doi-asserted-by":"crossref","unstructured":"Burguera I, Zurutuza U, Nadjm-Tehrani S (2011) Crowdroid: behavior-based malware detection system for android. In Proc. of the 1st ACM workshop on Security and privacy in smartphones and mobile devices (pp. 15-26). ACM","DOI":"10.1145\/2046614.2046619"},{"key":"1220_CR7","unstructured":"Xu R, Sa\u00efdi H, Anderson R (2012) \u201cAurasium: Practical policy enforcement for Android applications,\u201d in Proc. 21st USENIX Conf. Security Symp., USENIX Association"},{"key":"1220_CR8","unstructured":"Borges P et al. (2017) \"Towards a Hybrid Intrusion Detection System for Android-based PPDR terminals,\" 2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM), Lisbon. 1034\u20131039"},{"issue":"3","key":"1220_CR9","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/s11277-010-0069-6","volume":"57","author":"N Ulltveit-Moe","year":"2011","unstructured":"Ulltveit-Moe N, Oleshchuk VA, Koien GM (2011) Location-aware mobile intrusion detection with enhanced privacy in 5G context. Wirel Pers Commun 57(3):317\u2013338","journal-title":"Wirel Pers Commun"},{"key":"1220_CR10","unstructured":"Huang D, Zhang X, Kang M, Luo J (2010) \u201cMobiCloud: building secure cloud framework for mobile computing and communication,\u201d In Service Oriented Sys-tem Engineering (SOSE), 2010 Fifth IEEE International Symposium. 27\u201334"},{"key":"1220_CR11","doi-asserted-by":"crossref","unstructured":"Ribeiro JC, Mantas G, Saghezchi FB, Rodriguez J, Abd-Alhameed RA (2019) \u201cTowards an Autonomous Host-based Intrusion Detection System for Android Mobile Devices\u201d, V. Sucasas et al. (Eds.): BROADNETS 2018, LNICST 263","DOI":"10.1007\/978-3-030-05195-2_14"},{"key":"1220_CR12","unstructured":"Andrew Ng, (2018). Machine Learning. Coursera, Stanford University, (Online). \nhttps:\/\/www.coursera.org\/learn\/machine-learning\/lecture\/V9MNG\/problem-motivation"},{"issue":"3","key":"1220_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv (CSUR) 41(3):1\u201358","journal-title":"ACM Comput Surv (CSUR)"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-019-01220-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01220-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01220-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,18]],"date-time":"2020-02-18T11:02:29Z","timestamp":1582023749000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-019-01220-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,18]]},"references-count":13,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["1220"],"URL":"https:\/\/doi.org\/10.1007\/s11036-019-01220-y","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,18]]},"assertion":[{"value":"18 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}