{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T00:05:24Z","timestamp":1725667524562},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1109\/cnsm.2015.7367339","type":"proceedings-article","created":{"date-parts":[[2016,1,4]],"date-time":"2016-01-04T16:34:58Z","timestamp":1451925298000},"page":"57-63","source":"Crossref","is-referenced-by-count":6,"title":["Behavioral and dynamic security functions chaining for Android devices"],"prefix":"10.1109","author":[{"given":"Gaetan","family":"Hurel","sequence":"first","affiliation":[]},{"given":"Remi","family":"Badonnel","sequence":"additional","affiliation":[]},{"given":"Abdelkader","family":"Lahmadi","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Festor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348563"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624000"},{"journal-title":"The Squid proxy","year":"2015","key":"ref10"},{"journal-title":"Suricata IDS\/IPS","year":"2015","key":"ref11"},{"key":"ref12","article-title":"An Analysis of Power Consumption in a Smartphone","author":"carroll","year":"2010","journal-title":"Proc of the 2010 USENIX Annual Technical Conference"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14778\/2350229.2350262"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566868"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2386139"},{"key":"ref16","first-page":"543","article-title":"Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags","author":"fayazbakhsh","year":"2014","journal-title":"Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation NSDI 2014"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.07.007"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342457"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568276"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2645892.2645896"},{"journal-title":"Smartphone OS market share 2014","year":"2015","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486022"},{"journal-title":"Google Battery Historian tool","year":"2015","key":"ref3"},{"journal-title":"The Dansguardian tool","year":"2015","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342359"},{"journal-title":"Statista - Number of available applications in the Google Play Store from December 2009 to February 2015","year":"2015","key":"ref5"},{"journal-title":"The Mininet emulator","year":"2015","key":"ref8"},{"journal-title":"Emerging threats open ruleset","year":"2015","key":"ref7"},{"journal-title":"Cisco Systems NetFlow Services Export","year":"2015","key":"ref2"},{"journal-title":"The Netfilter firewall","year":"2014","key":"ref9"},{"journal-title":"Blacklisted IPs dataset","year":"2015","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140340"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140443"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.298"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.11.004"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.013012.00028"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1622103.1629656"}],"event":{"name":"2015 11th International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2015,11,9]]},"location":"Barcelona, Spain","end":{"date-parts":[[2015,11,13]]}},"container-title":["2015 11th International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7360263\/7367318\/07367339.pdf?arnumber=7367339","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T23:38:34Z","timestamp":1490398714000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7367339\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/cnsm.2015.7367339","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]}}}