{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T17:55:44Z","timestamp":1775066144092,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,4]]},"DOI":"10.1109\/noms.2012.6212067","type":"proceedings-article","created":{"date-parts":[[2012,6,19]],"date-time":"2012-06-19T21:01:35Z","timestamp":1340139695000},"page":"1303-1310","source":"Crossref","is-referenced-by-count":7,"title":["Monitoring and detecting abnormal behavior in mobile cloud infrastructure"],"prefix":"10.1109","author":[{"family":"Taehyun Kim","sequence":"first","affiliation":[]},{"family":"Yeongrak Choi","sequence":"additional","affiliation":[]},{"family":"Seunghee Han","sequence":"additional","affiliation":[]},{"family":"Jae Yoon Chung","sequence":"additional","affiliation":[]},{"family":"Jonghwan Hyun","sequence":"additional","affiliation":[]},{"family":"Jian Li","sequence":"additional","affiliation":[]},{"given":"J. W.","family":"Hong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"729","article-title":"Intrusion Detection in the Cloud","author":"roschke","year":"0","journal-title":"Dependable Autonomic and Secure Computing 2009 DASC '09 Eighth IEEE International Conference on Chengdu China December 12-14 2009"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2010.78"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2010.79"},{"key":"23","year":"0","journal-title":"Android-x86 - Porting Android to X86"},{"key":"18","year":"0"},{"key":"24","year":"0","journal-title":"Open Virtual Switch"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"13","year":"2011","journal-title":"HongTouTou"},{"key":"14","year":"2011","journal-title":"PJApps B - Girl Mahjong Android"},{"key":"11","article-title":"Defining the Mobile Cloud","author":"warner","year":"0","journal-title":"NASA IT Summit 2010 August 16-18 2010"},{"key":"12","year":"2010","journal-title":"GoldMiner"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2010.71"},{"key":"3","article-title":"IT Cloud Services User Survey, pt.2: Top Benefits & Challenges","author":"gens","year":"2008","journal-title":"IDC EXchange"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2009.89"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2010.5534992"},{"key":"1","year":"2011","journal-title":"The Battle for the Most Content and the Emerging Tablet Market"},{"key":"10","author":"marinelli","year":"2009","journal-title":"Hyrax Cloud Computing on Mobile Devices Using MapRecuce"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1002\/sec.341"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0148-x"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"4","author":"chen","year":"2010","journal-title":"What's New about Cloud Computing Security?"},{"key":"9","article-title":"Crowdroid: Behaviorbased malware detection system for android","author":"burguera","year":"0","journal-title":"Proceedings of the 1st Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM'11) New York NY USA October 17 2011"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"}],"event":{"name":"2012 IEEE\/IFIP Network Operations and Management Symposium (NOMS 2012)","location":"Maui, HI","start":{"date-parts":[[2012,4,16]]},"end":{"date-parts":[[2012,4,20]]}},"container-title":["2012 IEEE Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6203618\/6211874\/06212067.pdf?arnumber=6212067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T16:38:58Z","timestamp":1490114338000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6212067\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/noms.2012.6212067","relation":{},"subject":[],"published":{"date-parts":[[2012,4]]}}}