{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:43:44Z","timestamp":1729647824785,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/mipro.2016.7522358","type":"proceedings-article","created":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T17:41:29Z","timestamp":1470418889000},"page":"1397-1401","source":"Crossref","is-referenced-by-count":3,"title":["Safe use of mobile devices in the cyberspace"],"prefix":"10.1109","author":[{"given":"S. L. R.","family":"Vrhovec","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"46","article-title":"TIM Lecture Series The Expanding Cybersecurity Threat","author":"mcguire","year":"2015","journal-title":"Technol Innov Manag Rev"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ITechA.2015.7317411"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2386139"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813714"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.19026\/rjaset.8.1244"},{"key":"ref15","first-page":"3","article-title":"A Survey of Android Security Threats and Defenses","volume":"6","author":"rashidi","year":"2015","journal-title":"J Wirel Mob Networks Ubiquitous Comput Dependable Appl"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-015-0369-4"},{"key":"ref17","first-page":"714","article-title":"Fest: A Feature Extraction and Selection Tool for Android Malware Detection","author":"zhao","year":"2016","journal-title":"Proceedings &#x2013; IEEE Symposium on Computers and Communications"},{"year":"2016","key":"ref18","article-title":"Threat Report 2015"},{"year":"2016","key":"ref19","article-title":"McAfee Labs Threats Report &#x2013; March 2016"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.04.009"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2016.10.2.02"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808126"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO.2015.7160474"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"549","DOI":"10.2307\/25750691","article-title":"Fear Appeals and Information Security Behaviors: An Empirical Study","volume":"34","author":"johnston","year":"2010","journal-title":"MIS Q"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"year":"2015","key":"ref8","article-title":"Kaspersky Security Bulletin 2013"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1109\/MWC.2015.7054729","article-title":"Mobile Application Security: Malware Threats and Defenses","volume":"22","author":"daojing","year":"2015","journal-title":"IEEE Wireless Communcations"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.11.001"},{"year":"2016","key":"ref9","article-title":"Trends 2016: (In)security everywhere"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2016.01.006"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-014-0216-9"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.10.004"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.143"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2014.163"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.11.002"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-04-2015-0018"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"530250","DOI":"10.1155\/2015\/530250","article-title":"Detection of Malware Propagation in Sensor Node and Botnet Group Clustering based on Email Spam Analysis","author":"lee","year":"2015","journal-title":"Int J Distrib Sens Networks"}],"event":{"name":"2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","start":{"date-parts":[[2016,5,30]]},"location":"Opatija, Croatia","end":{"date-parts":[[2016,6,3]]}},"container-title":["2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7513176\/7522093\/07522358.pdf?arnumber=7522358","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T07:16:41Z","timestamp":1568272601000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7522358\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/mipro.2016.7522358","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}