{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T15:10:07Z","timestamp":1744211407689},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2016,12,6]],"date-time":"2016-12-06T00:00:00Z","timestamp":1480982400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1007\/s11042-016-4189-1","type":"journal-article","created":{"date-parts":[[2016,12,6]],"date-time":"2016-12-06T03:28:41Z","timestamp":1480994921000},"page":"18153-18173","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["SafeGuard: a behavior based real-time malware detection scheme for mobile multimedia applications in android platform"],"prefix":"10.1007","volume":"76","author":[{"given":"Eun Su","family":"Jeong","sequence":"first","affiliation":[]},{"given":"In Seok","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Dong Hoon","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,12,6]]},"reference":[{"key":"4189_CR1","doi-asserted-by":"crossref","unstructured":"Blasing T, Batyuk L, Schmidt AD, Camtepe SA, Albayrak S (2010) An Android Application Sandbox system for suspicious software detection. 2010 5th International Conference on Malicious and Unwanted Software (MALWARE), pp 55\u201362, October 2010","DOI":"10.1109\/MALWARE.2010.5665792"},{"key":"4189_CR2","doi-asserted-by":"crossref","unstructured":"Burguera I, Zurutuza U, Nadjm-Tehrani S (2011) Crowdroid: behavior-based malware detection system for Android. Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, pp 15\u201326","DOI":"10.1145\/2046614.2046619"},{"key":"4189_CR3","doi-asserted-by":"crossref","unstructured":"Chan PPK, Song W-K (2014) Static detection of Android malware by using permissions and API calls. in 2014 International Conference on Machine Learning and Cybernetics (ICMLC), vol. 1, pp. 82\u201387","DOI":"10.1109\/ICMLC.2014.7009096"},{"key":"4189_CR4","doi-asserted-by":"crossref","unstructured":"Di Cerbo F, Girardello A, Michahelles F, Voronkova S (2011) Detection of malicious applications on android os. Proceedings of the 4th international conference on Computational forensics, IWCF\u201910, pp 138\u2013149, November 2011","DOI":"10.1007\/978-3-642-19376-7_12"},{"key":"4189_CR5","unstructured":"Enck W, Gilbert P, Chun B-G, Cox LP, Jung J, McDaniel P, Sheth AN (2010) Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. Proceedings of the 9th USENIX conference on Operating systems design and implementation, October 2010"},{"key":"4189_CR6","unstructured":"Fuchs AP, Chaudhuri A, Foster JS (2009) SCanDroid: Automated Security Certification of Android Applications. Technical Report CSTR-4991, Department of Computer Science, University of Maryland, November 2009"},{"key":"4189_CR7","unstructured":"Google Play. Play.google.com. Retrieved 25 June 2015, from \nhttps:\/\/play.google.com\/store"},{"key":"4189_CR8","doi-asserted-by":"crossref","unstructured":"Isohara T, Takemori K, Kubota A (2011) Kernel-based Behavior Analysis for Android Malware Detection. 2011 Seventh International Conference on Computational Intelligence and Security, pp 1011\u20131015, Dec 2011","DOI":"10.1109\/CIS.2011.226"},{"key":"4189_CR9","doi-asserted-by":"crossref","unstructured":"Jang J, Yun J, Woo J, Kim HK (2014) Andro-profiler: anti-malware system based on behavior profiling of mobile malware. in Proceedings of the Companion Publication of the 23rd International Conference on World Wide Web Companion, pp. 737\u2013738","DOI":"10.1145\/2567948.2579366"},{"key":"4189_CR10","unstructured":"Juniper Networks Inc (2011) Malicious mobile threats report 2010\/2011. Technical report, Juniper Networks, Inc."},{"key":"4189_CR11","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1007\/978-94-007-2792-2_50","volume":"114","author":"S Kim","year":"2012","unstructured":"Kim S, Cho JI, Myeong HW, Lee DH (2012) A study on static analysis model of mobile application for privacy protection. Computer Science and Convergence 114:529\u2013540","journal-title":"Computer Science and Convergence"},{"key":"4189_CR12","unstructured":"Manjunath V (2011) Reverse Engineering of Malware on Android. SANS Institute InfoSec Reading Room, August 2011"},{"key":"4189_CR13","unstructured":"NQ Mobile\u2019s Security Lab (2012) NQ mobile\u2019s 2012 security report, pp 1\u20134. Retrieved from \nhttp:\/\/www.nq.com\/2012_NQ_Mobile_Security_Report.pdf"},{"key":"4189_CR14","doi-asserted-by":"crossref","unstructured":"Rastogi V, Chen Y, Enck W (2013) AppsPlayground: automatic security analysis of smartphone applications. in Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy (CODASPY '13), pp. 209\u2013220, ACM, February 2013","DOI":"10.1145\/2435349.2435379"},{"key":"4189_CR15","unstructured":"Retina-X Studios (2009) Android mobile spy software. [Online]  http:\/\/www.mobile-spy.com\/android.html"},{"key":"4189_CR16","unstructured":"Wu D-J, Mao C-H, Wei T-E, Lee H-M, Wu K-P (2012) DroidMat: Android Malware Detection through Manifest and API Calls Tracing. 2012 Seventh Asia Joint Conference on Information Security (Asia JCIS), pp 62\u201329, August 2012"},{"issue":"3","key":"4189_CR17","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MCOM.2014.6766089","volume":"52","author":"L Wu","year":"2014","unstructured":"Wu L, Du X, Fu X (March 2014) Security threats to mobile multimedia applications: Camera-based attacks on mobile phones. Communications Magazine, IEEE 52(3):80\u201387","journal-title":"Communications Magazine, IEEE"},{"key":"4189_CR18","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/978-3-642-27503-6_22","volume":"243","author":"M Zhao","year":"2011","unstructured":"Zhao M, Ge F, Zhang T, Yuan Z (2011) Antimaldroid: An efficient SVM-based malware detection framework for android. Communications in Computer and Information Science 243:158\u2013166","journal-title":"Communications in Computer and Information Science"},{"key":"4189_CR19","unstructured":"Zhou Y, Wang Z, Zhou W, Jiang X (2012) Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets. Proceedings of the 19th Annual Network & Distributed System Security Symposium, Feb 2012"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-4189-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-4189-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-4189-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T07:25:39Z","timestamp":1500967539000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-4189-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,6]]},"references-count":19,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["4189"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-4189-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,12,6]]}}}