{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T03:20:53Z","timestamp":1648869653196},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,6,1]],"date-time":"2016-06-01T00:00:00Z","timestamp":1464739200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Serv Sci Res"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s12927-016-0004-9","type":"journal-article","created":{"date-parts":[[2016,6,29]],"date-time":"2016-06-29T14:58:08Z","timestamp":1467212288000},"page":"73-83","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Automated malware analysis service using mobile virtual box"],"prefix":"10.1007","volume":"8","author":[{"given":"Jang Il","family":"Kim","sequence":"first","affiliation":[]},{"given":"Kyung Shin","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Ki Won","family":"Nam","sequence":"additional","affiliation":[]},{"given":"Yong-Gyu","family":"Jung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,24]]},"reference":[{"key":"4_CR1","volume-title":"Research Journal for Security Engineering","author":"YM Bae","year":"2011","unstructured":"Bae YM (2011) Technology Trend of Desktop Virtualization for Information Security. Research Journal for Security Engineering."},{"key":"4_CR2","volume-title":"Journal of Information Processing Society","author":"BJ Choi","year":"2011","unstructured":"Choi BJ (2011) A study on the concept and implementation method for Korea Virtualizationbased Mobile Cloud Computing, Journal of Information Processing Society"},{"key":"4_CR3","volume-title":"Korea Network Information Society in 2010 Annual General Meeting and Fall Conference","author":"JY Choi","year":"2010","unstructured":"Choi JY (2010) Malware Analysis of hardware virtualization, Korea Network Information Society in 2010 Annual General Meeting and Fall Conference."},{"issue":"2","key":"4_CR4","first-page":"219","volume":"11","author":"YG Jung","year":"2011","unstructured":"Jung YG (2011) Hospital Security System using Biometric Technology, J.IWIT, 11(2):219\u2013224.","journal-title":"J.IWIT"},{"key":"4_CR5","volume-title":"A Study of Efficient Dynamic Analysis for Malware Detection in a Mobile Platform","author":"HY Kim","year":"2013","unstructured":"Kim HY (2013) A Study of Efficient Dynamic Analysis for Malware Detection in a Mobile Platform. Korea Information Processing Society."},{"key":"4_CR6","volume-title":"Security News","author":"TH Kim","year":"2015","unstructured":"Kim TH (2015) APT attack type and countermeasures, Security News."},{"key":"4_CR7","volume-title":"Android malware, year-on-year doubling","author":"MH Lee","year":"2015","unstructured":"Lee MH (2015) Android malware, year-on-year doubling, Digital Daily."},{"key":"4_CR8","volume-title":"McAfee Threats Report: First Quarter 2012","author":"McAfee","year":"2012","unstructured":"McAfee (2012) McAfee Threats Report: First Quarter 2012."},{"key":"4_CR9","volume-title":"Technology Trend for Android-based Malware Detector","author":"MH Shin","year":"2013","unstructured":"Shin MH (2013) Technology Trend for Android-based Malware Detector, Electronics and Telecommunications Research Institute."},{"key":"4_CR10","unstructured":"Sophos (2013) Security Threat Report 2013."},{"key":"4_CR11","volume-title":"Advance Persistent Threats, Zero-day Attacks, and Business Resilience","author":"Twitter by Splunk","year":"2010","unstructured":"Twitter by Splunk (2010) Advance Persistent Threats, Zero-day Attacks, and Business Resilience, Splunk Blogs."},{"key":"4_CR12","volume-title":"Proc 21st USENIX conf. Security Symp.","author":"LK Yan","year":"2012","unstructured":"Yan LK & Yin H (2012) DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis, Proc 21st USENIX conf. Security Symp., Security."},{"key":"4_CR13","volume-title":"Statistics for Subscribers of Wire \u00b7 Wireless Communication","author":"SH Yeom","year":"2012","unstructured":"Yeom SH (2012) Statistics for Subscribers of Wire \u00b7 Wireless Communication, Korea Communications Commission."}],"container-title":["Journal of Service Science Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12927-016-0004-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12927-016-0004-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12927-016-0004-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,6,29]],"date-time":"2016-06-29T14:59:31Z","timestamp":1467212371000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12927-016-0004-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":13,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["4"],"URL":"https:\/\/doi.org\/10.1007\/s12927-016-0004-9","relation":{},"ISSN":["2093-0720","2093-0739"],"issn-type":[{"value":"2093-0720","type":"print"},{"value":"2093-0739","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6]]}}}