{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:26:26Z","timestamp":1729653986170,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/aiccsa.2014.7073207","type":"proceedings-article","created":{"date-parts":[[2015,4,3]],"date-time":"2015-04-03T11:21:03Z","timestamp":1428060063000},"page":"259-265","source":"Crossref","is-referenced-by-count":0,"title":["DAGGER: Distributed architecture for granular mitigation of mobile based attacks"],"prefix":"10.1109","author":[{"given":"Khaled","family":"Bakhit","sequence":"first","affiliation":[]},{"given":"Imad H.","family":"Elhajj","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Chehab","sequence":"additional","affiliation":[]},{"given":"Ayman","family":"Kayssi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Security Alert Geinimi Sophisticated New Android Trojan Found in Wild","year":"2010","author":"wyatt","key":"ref10"},{"journal-title":"Security Alert DroidDream Malware Found in Official Android Market","year":"2011","author":"mahaffey","key":"ref11"},{"journal-title":"DroidDream Becomes Android Market Nightmare","year":"2011","author":"bradley","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2012.6320432"},{"journal-title":"Cisco (2013 Feb ) Cisco visual networking index Global mobile data traffic forecast update","first-page":"2012","year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653690"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MoWNet.2013.6613793"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644928"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0148-x"},{"key":"ref19","article-title":"TaintDroid: An information-flow tracking system for realtime privacy","author":"enck","year":"2010","journal-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)"},{"journal-title":"Android Climbed to 79 Percent of Smartphone Market Share in 2013 but Its Growth Has Slowed","year":"2014","author":"fingas","key":"ref4"},{"journal-title":"Canalys (2013 Feb) Mobile device market to reach 2 6 billion units by","year":"2016","key":"ref3"},{"journal-title":"Google Play Hits One Million Android Apps","year":"2013","author":"rowinski","key":"ref6"},{"journal-title":"Android","year":"2014","key":"ref5"},{"journal-title":"McAfee (2013 Aug ) McAfee Labs Q2 Report Finds Mobile Threats Rebound","year":"0","key":"ref8"},{"year":"2014","author":"allen","key":"ref7"},{"journal-title":"Internation Data Corporation (2014 Jan) Worldwide Smartphone Shipments Top One Billion Units for the First Time According to IDC","year":"0","key":"ref2"},{"key":"ref1","article-title":"Smart-phone attacks and defenses","author":"guo","year":"2004","journal-title":"Proc ACM Workshop Hot Topics in Networks"},{"journal-title":"Cisco (2014 Jan ) Cisco Annual Security Report Documents Unprecedented Growth of Advanced Attacks and Malicious Traffic","year":"0","key":"ref9"},{"key":"ref20","article-title":"Detecting android malware on network level","volume":"12","author":"hand","year":"2011","journal-title":"University of California at Santa Barbara"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/978-3-319-01604-7_36","article-title":"NEMESYS: Enhanced network security for seamless service provisioning in the smart mobile ecosystem","author":"gelenbe","year":"2013","journal-title":"Information Sciences and Systems 2013"},{"key":"ref21","first-page":"229","article-title":"Snort: Lightweight intrusion detection for networkws","volume":"99","author":"roesch","year":"1999","journal-title":"LISA"},{"journal-title":"Xposed Framework","year":"2014","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"2014 IEEE\/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","start":{"date-parts":[[2014,11,10]]},"location":"Doha, Qatar","end":{"date-parts":[[2014,11,13]]}},"container-title":["2014 IEEE\/ACS 11th International Conference on Computer Systems and Applications (AICCSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7066213\/7073167\/07073207.pdf?arnumber=7073207","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T04:32:19Z","timestamp":1498192339000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7073207\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2014.7073207","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}