{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T10:27:51Z","timestamp":1758709671617},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,11,11]],"date-time":"2015-11-11T00:00:00Z","timestamp":1447200000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Korea government (MSIP)","award":["B0101-15-1293"],"award-info":[{"award-number":["B0101-15-1293"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s11277-015-3121-8","type":"journal-article","created":{"date-parts":[[2015,11,11]],"date-time":"2015-11-11T08:04:00Z","timestamp":1447229040000},"page":"1697-1710","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Intelligent Security Model of Smart Phone Based on Human Behavior in Mobile Cloud Computing"],"prefix":"10.1007","volume":"91","author":[{"given":"Daesung","family":"Moon","sequence":"first","affiliation":[]},{"given":"Ikkyun","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jae Woong","family":"Joo","sequence":"additional","affiliation":[]},{"given":"Hyung Jin","family":"Im","sequence":"additional","affiliation":[]},{"given":"Jong Hyuk","family":"Park","sequence":"additional","affiliation":[]},{"given":"Young-Sik","family":"Jeong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,11]]},"reference":[{"issue":"1","key":"3121_CR1","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s11227-013-0970-3","volume":"66","author":"Y-S Jeong","year":"2013","unstructured":"Jeong, Y.-S., Kim, H.-W., & Jang, H. J. (2013). Adaptive resource management scheme for monitoring of CPS. Journal of Supercomputing, 66(1), 57\u201369.","journal-title":"Journal of Supercomputing"},{"issue":"3","key":"3121_CR2","doi-asserted-by":"crossref","first-page":"1194","DOI":"10.1007\/s11227-011-0667-4","volume":"66","author":"J-M Gil","year":"2013","unstructured":"Gil, J.-M., Park, J. H., & Jeong, Y.-S. (2013). Data center selection based on neuro-fuzzy inference systems in cloud computing environments. Journal of Supercomputing, 66(3), 1194\u20131214.","journal-title":"Journal of Supercomputing"},{"issue":"4","key":"3121_CR3","doi-asserted-by":"crossref","first-page":"696","DOI":"10.4218\/etrij.15.0114.0883","volume":"37","author":"M Pattaranantakul","year":"2015","unstructured":"Pattaranantakul, M., Sanguannam, K., Sangwongngam, P., & Vorakulpipat, C. (2015). Efficient key management protocol for secure RTMP video streaming toward trusted quantum network. ETRI Journal, 37(4), 696\u2013706.","journal-title":"ETRI Journal"},{"issue":"4","key":"3121_CR4","doi-asserted-by":"crossref","first-page":"7","DOI":"10.15207\/JKCS.2013.4.4.007","volume":"4","author":"FB Degefa","year":"2013","unstructured":"Degefa, F. B., & Won, D. (2013). Extended key management scheme for dynamic group in multi-cast communication. Journal of Convergence, 4(4), 7\u201313.","journal-title":"Journal of Convergence"},{"issue":"22","key":"3121_CR5","first-page":"1","volume":"3","author":"MI Malkawi","year":"2013","unstructured":"Malkawi, M. I. (2013). The art of software systems development: Reliability, availability, maintainability, performance (RAMP). Human-Centric Computing and Information Sciences, 3(22), 1\u201317.","journal-title":"Human-Centric Computing and Information Sciences"},{"issue":"2","key":"3121_CR6","doi-asserted-by":"crossref","first-page":"287","DOI":"10.3745\/JIPS.2013.9.2.287","volume":"9","author":"S-H Lee","year":"2013","unstructured":"Lee, S.-H., & Lee, I.-Y. (2013). A secure index management scheme for providing data sharing in cloud storage. Journal of Information Processing Systems, 9(2), 287\u2013300.","journal-title":"Journal of Information Processing Systems"},{"issue":"4","key":"3121_CR7","first-page":"1405","volume":"2","author":"N Shrivastava","year":"2013","unstructured":"Shrivastava, N., & Kumar, G. (2013). A survey on cost effective multi-cloud storage in cloud computing. International Journal of Advanced Research in Computer Engineering and Technology, 2(4), 1405\u20131409.","journal-title":"International Journal of Advanced Research in Computer Engineering and Technology"},{"issue":"2","key":"3121_CR8","first-page":"25","volume":"3","author":"T-T Truong","year":"2012","unstructured":"Truong, T.-T., Tran, M.-T., & Duong, A.-D. (2012). Improvement of the more efficient & secure ID-based remote mutual authentication with key agreement scheme for mobile devices on ECC. Journal of Convergence, 3(2), 25\u201336.","journal-title":"Journal of Convergence"},{"issue":"2","key":"3121_CR9","first-page":"205","volume":"11","author":"A Dahane","year":"2015","unstructured":"Dahane, A., Berrached, N.-E., & Loukil, A. (2015). A virtual laboratory to practice mobile wireless sensor networks: A case study on energy efficient and safe weighted clustering algorithm. Journal of Information Processing Systems, 11(2), 205\u2013228.","journal-title":"Journal of Information Processing Systems"},{"issue":"7","key":"3121_CR10","first-page":"1","volume":"4","author":"R Singh","year":"2014","unstructured":"Singh, R., Singh, P., & Duhan, M. (2014). An effective implementation of security based algorithmic approach in mobile adhoc networks. Human-Centric Computing and Information Sciences, 4(7), 1\u201314.","journal-title":"Human-Centric Computing and Information Sciences"},{"key":"3121_CR11","first-page":"1","volume":"2014","author":"H-W Kim","year":"2014","unstructured":"Kim, H.-W., Kim, J.-H., Park, J. H., & Jeong, Y.-S. (2014). Time pattern locking scheme for secure multimedia contents in human-centric device. The Scientific World Journal, 2014, 1\u20139.","journal-title":"The Scientific World Journal"},{"issue":"2","key":"3121_CR12","first-page":"547","volume":"2","author":"PE Gaonkar","year":"2013","unstructured":"Gaonkar, P. E., Bojewar, S., & Das, J. A. (2013). A survey: Data storage technologies. International Journal of Engineering Science and Innovative Technology, 2(2), 547\u2013554.","journal-title":"International Journal of Engineering Science and Innovative Technology"},{"issue":"6","key":"3121_CR13","doi-asserted-by":"crossref","first-page":"1847","DOI":"10.1016\/j.jnca.2012.07.009","volume":"35","author":"B Dong","year":"2012","unstructured":"Dong, B., Zheng, Q., Tian, F., Chao, K., Ma, R., & Anane, R. (2012). An optimized approach for storing and accessing small files on cloud storage. Journal of Network and Computer Applications, 35(6), 1847\u20131862.","journal-title":"Journal of Network and Computer Applications"},{"key":"3121_CR14","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1016\/j.asoc.2014.04.027","volume":"22","author":"M Chattopadhyay","year":"2014","unstructured":"Chattopadhyay, M., Dan, P. K., & Mazumdar, S. (2014). Comparison of visualization of optimal clustering using self-organizing map and growing hierarchical self-organizing map in cellular manufacturing system. Applied Soft Computing, 22, 528\u2013543.","journal-title":"Applied Soft Computing"},{"issue":"5","key":"3121_CR15","first-page":"247","volume":"1","author":"J Mohammed","year":"2014","unstructured":"Mohammed, J. (2014). Evolution of the next generation of technologies: Mobile and ubiquitous computing. International Journal of Advanced Research in Science, Engineering and Technology, 1(5), 247\u2013253.","journal-title":"International Journal of Advanced Research in Science, Engineering and Technology"},{"key":"3121_CR16","doi-asserted-by":"crossref","first-page":"8079","DOI":"10.3390\/su6118079","volume":"6","author":"JH Park","year":"2014","unstructured":"Park, J. H., Kim, H.-W., & Jeong, Y.-S. (2014). Efficiency sustainability resource visual simulator for clustered desktop virtualization based on cloud infrastructure. Sustainability, 6, 8079\u20138091.","journal-title":"Sustainability"},{"key":"3121_CR17","doi-asserted-by":"publisher","unstructured":"Kim, H.-W., Park, J. H., & Jeong, Y.-S. (2015). Human-centric storage resource mechanism for big data on cloud service architecture. Journal of Supercomputing. doi: 10.1007\/s11227-015-1390-3 .","DOI":"10.1007\/s11227-015-1390-3"},{"key":"3121_CR18","doi-asserted-by":"publisher","unstructured":"Duan, H., Yu, S., Mei, M., Zhan, W., & Li, L. (2015). CSTORE: A desktop-oriented distributed public cloud storage system. Computers and Electrical Engineering. doi: 10.1016\/j.compeleceng.2014.11.001 .","DOI":"10.1016\/j.compeleceng.2014.11.001"},{"key":"3121_CR19","unstructured":"Suarez-Tangil, G., Conti, M. (2014). Detecting targeted smart phone malware with behavior-triggering stochastic models. In Proceedings of 19th European symposium on research in computer security, 7\u201311 (pp. 183\u2013201). Wroclaw, Poland."},{"key":"3121_CR20","doi-asserted-by":"crossref","unstructured":"Raveendranath, R., Rajamani, V., & Datta, S. K. (2014) Android malware attacks and countermeasures: Current and future directions. In Proceedings of 2014 international conference on control, instrumentation, communication and computational technologies, 10\u201311 (pp. 137\u2013143). IEEE, Kanyakumari.","DOI":"10.1109\/ICCICCT.2014.6992944"},{"key":"3121_CR21","doi-asserted-by":"crossref","unstructured":"Luo, T., Hao, H., Du, W., Wang, Y., & Yin, H. (2011). Attacks on WebView in the android system. In Proceedings of 27th annual computer security applications conference, 5\u20139 (pp. 343\u2013352). Orlando, FL, USA.","DOI":"10.1145\/2076732.2076781"},{"key":"3121_CR22","doi-asserted-by":"crossref","unstructured":"Zhou, Y., & Jiang, X. (2012). Dissecting android malware: Characterization and evolution. In Proceedings of 2012 IEEE symposium on security and privacy, 20\u201323 (pp. 95\u2013109). IEEE, San Francisco, CA.","DOI":"10.1109\/SP.2012.16"},{"key":"3121_CR23","unstructured":"Kim, H., Smith, J., & Shin, K. G. (2010). Detecting energy-greedy anomalies and mobile malware variants. In Proceedings of the international conference on mobile systems, applications, and services, 15\u201318 (pp. 239\u2013252). ACM, Breckenridge, Colorado, USA."},{"key":"3121_CR24","doi-asserted-by":"crossref","unstructured":"Mu, J., Cui, A., & Rao, J. (2013). Android mobile security-threats and protection. In Proceedings of international conference on computer, networks and communication engineering (ICCNCE 2013), 23\u201324 (pp. 683\u2013686). Atlantis Press, Beijing, China.","DOI":"10.2991\/iccnce.2013.169"},{"key":"3121_CR25","unstructured":"Louk, M., Lim, H., & Lee, H. (2014). An Analysis of security system for intrusion in smart phone environment. The Scientific World Journal, 2014 (pp. 1\u201312), Article ID 983901."},{"issue":"1","key":"3121_CR26","first-page":"338","volume":"10","author":"CF Mohd Foozy","year":"2013","unstructured":"Mohd Foozy, C. F., Ahmad, R., & Abdollah, M. F. (2013). Phishing detection taxonomy for mobile device. International Journal of Computer Science Issues, 10(1), 338\u2013344.","journal-title":"International Journal of Computer Science Issues"},{"key":"3121_CR27","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.jnca.2013.05.008","volume":"38","author":"S-H Seo","year":"2014","unstructured":"Seo, S.-H., Gupta, A., Sallam, A. M., Bertino, E., & Yim, K. (2014). Detecting mobile malware threats to homeland security through static analysis. Journal of Network and Computer Applications, 38, 43\u201353.","journal-title":"Journal of Network and Computer Applications"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-3121-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-015-3121-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-3121-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-3121-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T09:18:31Z","timestamp":1559380711000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-015-3121-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,11]]},"references-count":27,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["3121"],"URL":"https:\/\/doi.org\/10.1007\/s11277-015-3121-8","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,11]]}}}