{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:21:47Z","timestamp":1729678907763,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/malware.2015.7413694","type":"proceedings-article","created":{"date-parts":[[2016,2,25]],"date-time":"2016-02-25T16:20:24Z","timestamp":1456417224000},"page":"136-143","source":"Crossref","is-referenced-by-count":5,"title":["Targeted DoS on android: how to disable android in 10 seconds or less"],"prefix":"10.1109","author":[{"given":"Ryan","family":"Johnson","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Elsabagh","sequence":"additional","affiliation":[]},{"given":"Angelos","family":"Stavrou","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Sritapan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/2635868.2635869"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/1999995.2000018"},{"key":"ref12","article-title":"Safe execution of dynamically loaded code on mobile phones","volume":"73","author":"plnk","year":"2012","journal-title":"Mobile and Ubiquitous Systems Computing Networking and Services"},{"key":"ref13","article-title":"A systematic security evaluation of android's multiuser framework","author":"ratazzi","year":"2014","journal-title":"arXiv preprint arXiv 1410 7752"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/2666620.2666621"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1007\/978-3-642-30436-1_2"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/s11416-014-0223-x"},{"year":"0","article-title":"Apktool - a tool for reverse engineering android apk files","key":"ref17"},{"year":"0","article-title":"<provider>- android's developers","key":"ref18"},{"year":"0","article-title":"Mobile security & antivirus - android apps on google play","key":"ref19"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/SURV.2013.101613.00077"},{"year":"0","article-title":"Xposed installer - xposed module repository","key":"ref27"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/2046614.2046618"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.14722\/ndss.2014.23247"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/2307636.2307663"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-04283-1_6","article-title":"Droidapiminer: Mining api-level features for robust malware detection in android","volume":"127","author":"aafer","year":"2013","journal-title":"Security and Privacy in Communication Networks"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/2480362.2480701"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/2046614.2046619"},{"year":"2015","article-title":"Global smartphone growth expected to slow to 11.3% in 2015 as market penetration increases in top markets, according to ide","key":"ref1"},{"year":"0","article-title":"Android 5.0 behavior changes - android developers","key":"ref20"},{"year":"0","article-title":"Intent - android developers","key":"ref22"},{"year":"0","article-title":"Airwatch agent - android apps on google play","key":"ref21"},{"year":"0","article-title":"Low ram - android open source project","key":"ref24"},{"year":"0","article-title":"<activity>- android developers","key":"ref23"},{"year":"0","article-title":"core\/res\/androidmanifest.xrnl- platformlframeworkslbase - git at google","key":"ref26"},{"year":"0","article-title":"Processes and threads","key":"ref25"}],"event":{"name":"2015 10th International Conference on Malicious and Unwanted Software (MALWARE)","start":{"date-parts":[[2015,10,20]]},"location":"Fajardo, PR, USA","end":{"date-parts":[[2015,10,22]]}},"container-title":["2015 10th International Conference on Malicious and Unwanted Software (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7405773\/7413673\/07413694.pdf?arnumber=7413694","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T02:57:26Z","timestamp":1498273046000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7413694\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/malware.2015.7413694","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}