{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:01:57Z","timestamp":1729652517418,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/icmcs.2014.6911204","type":"proceedings-article","created":{"date-parts":[[2014,10,8]],"date-time":"2014-10-08T16:49:12Z","timestamp":1412786952000},"page":"961-966","source":"Crossref","is-referenced-by-count":3,"title":["Context-aware multi-agent based framework for securing Android"],"prefix":"10.1109","author":[{"given":"Mohammed","family":"Alam","sequence":"first","affiliation":[]},{"given":"Zhiyong","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Son","family":"Vuong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1998.738563"},{"key":"ref11","first-page":"187","article-title":"SPARTA, a Mobile Agent Based Intrusion Detection System","volume":"206","author":"krugel","year":"0"},{"key":"ref12","article-title":"Flexible, Mobile Agent based Intrusion Detection for Dynamic Network","author":"krugel","year":"2002","journal-title":"Proceedings of the European Wireless"},{"key":"ref13","article-title":"Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems","author":"mell","year":"1999","journal-title":"Proceedings of the Second International Workshop on Recent Advances in Intrusion Detection"},{"article-title":"The Implementation of IDA: An Intrusion Detection Agent System","year":"0","author":"asaka","key":"ref14"},{"article-title":"MA-IDS Architecture for Distributed Intrusion Detection using Mobile Agents","year":"0","author":"li","key":"ref15"},{"key":"ref16","article-title":"Computer System Immunity using Mobile Agents","author":"foukia","year":"2001","journal-title":"Proc of the 8th Annual Workshop HP OpenView University Association Berlin"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1007\/978-3-642-30955-7_18","article-title":"Kynoid: realtime enforcement of fine-grained, user-defined, and data-centric security policies for android","author":"schreckling","year":"2012","journal-title":"Information Security Theory and Practice Security Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755732"},{"article-title":"Andbot: towards advanced mobile botnets","year":"0","author":"xiang","key":"ref4"},{"article-title":"A Multi-Agent Security System for Android Platform","year":"2012","author":"cheng","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484373"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.122"},{"journal-title":"Test Report Anti-Malware Solutions for Android","year":"2012","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22723-3_6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.1998.5340400"},{"journal-title":"New Virus SMSZombie A Discovered by TrustGo Security Labs","year":"2012","key":"ref2"},{"article-title":"Defending a Computer System using Autonomous Agents","year":"0","author":"crosbie","key":"ref9"},{"journal-title":"CarrierIQ The Real Story","year":"2011","author":"rosenberg","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.2"},{"key":"ref22","article-title":"Enhancing security of linux-based android devices","author":"schmidt","year":"2008","journal-title":"15th International Linux Kongress"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.144"},{"key":"ref24","first-page":"326","article-title":"Context-aware Usage Control for Android","volume":"50","author":"bai","year":"2010","journal-title":"Security and Privacy in Communication Networks LNCS Social Informatics and Telecommunication Engineering"},{"key":"ref23","article-title":"Using JADE-LEAP to implement agents in mobile devices","author":"moreno","year":"2003","journal-title":"Departament d'Enginyeria Informtica in TILAB EXP in search of innovation"},{"key":"ref26","first-page":"99","article-title":"A methodology for the development of multi agent systems using the JADE platform","volume":"21","author":"nikraz","year":"2006","journal-title":"International Journal of Computer Systems Science & Engineering"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/9780470058411"}],"event":{"name":"2014 International Conference on Multimedia Computing and Systems (ICMCS)","start":{"date-parts":[[2014,4,14]]},"location":"Marrakech, Morocco","end":{"date-parts":[[2014,4,16]]}},"container-title":["2014 International Conference on Multimedia Computing and Systems (ICMCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6900112\/6911126\/06911204.pdf?arnumber=6911204","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T18:03:54Z","timestamp":1498154634000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6911204\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icmcs.2014.6911204","relation":{},"subject":[],"published":{"date-parts":[[2014,4]]}}}