{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T18:42:45Z","timestamp":1748630565789},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/wocc.2014.6839912","type":"proceedings-article","created":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T18:51:22Z","timestamp":1406573482000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["A hidden Markov model detection of malicious Android applications at runtime"],"prefix":"10.1109","author":[{"family":"Yang Chen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mo","family":"Ghorbanzadeh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kevin","family":"Ma","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Charles","family":"Clancy","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Robert","family":"McGwier","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"17","article-title":"Privilege escalation attacks on android","author":"davi","year":"2010","journal-title":"Proc 10th Conf Inform Security"},{"year":"2013","author":"zadgaonkar","journal-title":"Robotium Automated Testing for Android","key":"18"},{"key":"15","article-title":"Finegrained end-to-end network model via vector quantization and hidden markov processes","author":"ghorbanzadeh","year":"2013","journal-title":"IEEE International Conference on Communications"},{"year":"0","key":"16"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1145\/1999732.1999741"},{"key":"14","first-page":"267","author":"rabiner","year":"1990","journal-title":"A tutorial on Hidden Markov Models and Selected Applications in Speech Recognition"},{"key":"11","article-title":"Apex: Extending android permission model and enforcement with user-defined runtime constraints","author":"nauman","year":"2010","journal-title":"Proc ACM Symposium on InformAtion"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/ICCNC.2013.6504180"},{"key":"3","article-title":"Smart-phone attacks and defenses","author":"guo","year":"2004","journal-title":"Proc 1st Workshop on Hot Topics in Networks"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/MPRV.2004.21"},{"key":"1","article-title":"Analyzing interapplication communication in android","author":"chin","year":"2011","journal-title":"Proceedings of 2nd MobiSys"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1145\/2046614.2046618"},{"key":"7","article-title":"Malicious software for smartphones","author":"schmidt","year":"2008","journal-title":"Technical Report"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1007\/s11416-006-0022-0"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/IAW.2007.381933"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/SECCOMW.2006.359550"},{"key":"9","article-title":"Semantically rich application centric security in android","author":"ontang","year":"2011","journal-title":"Journalof Security and Communications Networks"},{"key":"8","article-title":"Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones","author":"enck","year":"2010","journal-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation"}],"event":{"name":"2014 23rd Wireless and Optical Communication Conference (WOCC)","start":{"date-parts":[[2014,5,9]]},"location":"Newark, NJ","end":{"date-parts":[[2014,5,10]]}},"container-title":["2014 23rd Wireless and Optical Communication Conference (WOCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6828589\/6839906\/06839912.pdf?arnumber=6839912","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T23:43:45Z","timestamp":1490312625000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6839912\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/wocc.2014.6839912","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}