{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:04:19Z","timestamp":1729631059621,"version":"3.28.0"},"reference-count":46,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/aiccsa.2013.6616461","type":"proceedings-article","created":{"date-parts":[[2013,10,10]],"date-time":"2013-10-10T23:31:57Z","timestamp":1381447917000},"page":"1-4","source":"Crossref","is-referenced-by-count":7,"title":["Smartphone applications security: Survey of new vectors and solutions"],"prefix":"10.1109","author":[{"given":"Ala","family":"Eshmawi","sequence":"first","affiliation":[]},{"given":"Suku","family":"Nair","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-008-0113-x"},{"key":"35","article-title":"Threat of mobile malware and abuse","author":"bobotek","year":"2010","journal-title":"MAAWG Wireless Special Interest Group"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199486"},{"journal-title":"GSMA Tech Rep","article-title":"Mobile messaging threat report","year":"2012","key":"36"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378626"},{"key":"33","article-title":"Phishing on mobile devices","author":"felt","year":"2011","journal-title":"Presentation at W2SP Web"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/712353"},{"journal-title":"GSMA Tech Rep","article-title":"Sms spam and mobile messaging attacks introduction, trends and examples","year":"2011","key":"34"},{"journal-title":"Server-side Polymorphic Android Applications","year":"2012","key":"16"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1145\/1166160.1166191"},{"journal-title":"Android Adsms","year":"2011","key":"13"},{"journal-title":"Security Alert Hacked Websites Serve Suspicious Android Apps (Notcompatible)","year":"2012","key":"14"},{"journal-title":"Ftc Cracks Down on Senders of Spam Text Messages Promoting \"Free Gift Cards","year":"2013","key":"37"},{"key":"11","article-title":"Lookout mobile threat report","author":"security","year":"2011","journal-title":"Lookout Mobile Security"},{"key":"38","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1145\/1321440.1321486","article-title":"Spam filtering for short messages","author":"cormack","year":"2007","journal-title":"CIKM"},{"journal-title":"These Aren't the Droid Updates You're Looking for","year":"2011","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2004.1437827"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2012.34"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398822"},{"key":"42","article-title":"Sms spam detection using content-less features","volume":"99","author":"xu","year":"2012","journal-title":"IEEE Intelligent Systems"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.5.6.844-851"},{"key":"40","article-title":"Smsassassin: Crowdsourcing driven mobile-based system for sms spam filtering","author":"indrapratha","year":"2011","journal-title":"Proc Workshop on Mobile Computer System and Applications"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1145\/2001576.2001816"},{"key":"44","article-title":"Sms spam detection by operating on bytelevel diistributions using hidden markov models (hmms)","author":"rafique","year":"2010","journal-title":"Proceedings of the Virus Bulletin Conference VB"},{"key":"46","article-title":"Feature reduction for optimum sms spam filtering using domain knowledge","author":"eshmawi","year":"2013","journal-title":"Proceedings of the 2013 International Conference on Security and Management SAM'13"},{"key":"22","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1007\/978-3-642-04342-0_13","article-title":"Virusmeter: Preventing your cellphone from spies","author":"liu","year":"2009","journal-title":"Recent Advances in Intrusion Detection"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378627"},{"journal-title":"Iphish Phishing Vulnerabilities on Consumer Electronics","year":"2008","author":"niu","key":"24"},{"journal-title":"Ui Spoofing Safari on the Iphone","year":"2010","author":"dhanjani","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33383-5_6"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2008.4696965"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2009.5342614"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/ecrime.2010.5706698"},{"journal-title":"Ernst and Young Tech Rep","article-title":"Rush to adopt mobile, cloud, social media creating security gaps","year":"2011","key":"3"},{"journal-title":"Panda Security Labs Tech Rep","article-title":"Quarterly report pandalabs","year":"2011","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"1","first-page":"96","article-title":"Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices","author":"becher","year":"2011","journal-title":"Proceedings of IEEE Symposium on Security and Privacy"},{"key":"30","article-title":"Detecting malware domains at the upper dns hierarchy","author":"antonakakis","year":"2011","journal-title":"Proceedings of the 20th USENIX Security Symposium"},{"journal-title":"Facbook Malvertising Attack Hits Users with Drive-by Download","year":"2011","author":"constantin","key":"7"},{"journal-title":"Malvertising Attacks on Facebook Farm Town Players","year":"2010","key":"6"},{"journal-title":"Vulnerabilities Found in Banking Apps","year":"2010","author":"schwartz","key":"32"},{"journal-title":"Trends for 2013 Astounding growth of mobile malware","year":"2012","key":"5"},{"journal-title":"Google Removes Banking Apps from Android Marketplace","year":"2010","author":"acohido","key":"31"},{"key":"4","article-title":"Privacy of smartphone applications","author":"eshmawi","year":"2013","journal-title":"Proc 1st Int Conf Comput Appl"},{"journal-title":"Mdk The Largest Mobile Botnet in China","year":"2013","author":"liu","key":"9"},{"journal-title":"Android Trojan Ggtracker Charges Premium Rate Sms Messages","year":"2011","author":"wyatt","key":"8"}],"event":{"name":"2013 ACS International Conference on Computer Systems and Applications (AICCSA)","start":{"date-parts":[[2013,5,27]]},"location":"Ifrane, Morocco","end":{"date-parts":[[2013,5,30]]}},"container-title":["2013 ACS International Conference on Computer Systems and Applications (AICCSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6597907\/6616408\/06616461.pdf?arnumber=6616461","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,30]],"date-time":"2019-07-30T16:13:37Z","timestamp":1564503217000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6616461\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2013.6616461","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}