{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:59Z","timestamp":1750307579236,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T00:00:00Z","timestamp":1259020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,24]]},"DOI":"10.1145\/1655925.1656098","type":"proceedings-article","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T15:21:10Z","timestamp":1259076070000},"page":"951-956","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Web service description for mobile phone virus"],"prefix":"10.1145","author":[{"given":"Chien-Yuan","family":"Lai","sequence":"first","affiliation":[{"name":"National Yunlin University of Science &amp; Technology, Yunlin, Taiwan"}]},{"given":"Hsiu-Sen","family":"Chiang","sequence":"additional","affiliation":[{"name":"Da-Yeh University, Taiwan"}]},{"given":"Ching-Chiang","family":"Chen","sequence":"additional","affiliation":[{"name":"National Yunlin University of Science &amp; Technology, Yunlin, Taiwan"}]},{"given":"Shih-Hao","family":"Chou","sequence":"additional","affiliation":[{"name":"Da-Yeh University, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2009,11,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460893"},{"key":"e_1_3_2_1_2_1","volume-title":"W. Wahlster (Ed.) European Conference on Artificial Intelligence, pp: 298--302","author":"Bernaras A.","year":"1996","unstructured":"Bernaras , A. , Laresogiti , I. and Corera , J . ( 1996 ), \" Building and reusing ontologies for electrical network applications \", In W. Wahlster (Ed.) European Conference on Artificial Intelligence, pp: 298--302 . Bernaras, A., Laresogiti, I. and Corera, J. (1996), \"Building and reusing ontologies for electrical network applications\", In W. Wahlster (Ed.) European Conference on Artificial Intelligence, pp: 298--302."},{"key":"e_1_3_2_1_3_1","volume-title":"Ontology I: The Furniture of the World. Treaties on Basic Philosophy","author":"Bunge M.","year":"1997","unstructured":"Bunge , M. ( 1997 ) \" Ontology I: The Furniture of the World. Treaties on Basic Philosophy \", Vol. 3 . Bunge, M. (1997) \"Ontology I: The Furniture of the World. Treaties on Basic Philosophy\", Vol. 3."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/5254.747902"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJMC.2007.011815"},{"key":"e_1_3_2_1_6_1","first-page":"3","volume-title":"Conference","author":"Chopra V.","year":"2001","unstructured":"Chopra , V. , Zoran , Z. , Damschen , G. , Dix , C. , Cauldwell , P. , Chawla , R. , Saunders , K. , Olander , G. , Norton , F. , Hong , T. , Ogbuji , U. ,&amp; Richman , M. A. ( 2001 ). Professional XML Web Services (Ed.), Wrox Press Inc., U.K . Conference , pp. 3 -- 15 . Chopra, V., Zoran, Z., Damschen, G., Dix, C., Cauldwell, P., Chawla, R., Saunders, K., Olander, G., Norton, F., Hong, T., Ogbuji, U.,&amp;Richman, M. A. (2001). Professional XML Web Services (Ed.), Wrox Press Inc., U.K. Conference, pp. 3--15."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2004.21"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the Workshop on Ontologies and Problem-Solving Methods, International Joint Conference on AI (IJCAI-99)","author":"Fernandez M. L.","year":"1999","unstructured":"Fernandez , M. L. ( 1999 ), \" Overview of Methodologies For Building Ontologies \", Proceedings of the Workshop on Ontologies and Problem-Solving Methods, International Joint Conference on AI (IJCAI-99) , Sweden. Fernandez, M. L. (1999), \"Overview of Methodologies For Building Ontologies\", Proceedings of the Workshop on Ontologies and Problem-Solving Methods, International Joint Conference on AI (IJCAI-99), Sweden."},{"key":"e_1_3_2_1_9_1","volume-title":"Towards a method to conceptualize domain ontologies,\" European Conference on Aritficial Intelligence, pp: 41--52","author":"Gomez-Perez A.","year":"1996","unstructured":"Gomez-Perez , A. , Fernandez , A. and Vicente , M. D . ( 1996 ), \" Towards a method to conceptualize domain ontologies,\" European Conference on Aritficial Intelligence, pp: 41--52 . Gomez-Perez, A., Fernandez, A. and Vicente, M. D. (1996), \"Towards a method to conceptualize domain ontologies,\" European Conference on Aritficial Intelligence, pp: 41--52."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1006\/knac.1993.1008"},{"key":"e_1_3_2_1_12_1","volume-title":"Canada, MSA.","author":"Gruninger M.","year":"1995","unstructured":"Gruninger , M. and Fox , M. S . ( 1995 ), \" Methodology for the Design and Evaluation of Ontologies\" Department of Industrial Engineering University of Toronto , Canada, MSA. Gruninger, M. and Fox, M. S. (1995), \"Methodology for the Design and Evaluation of Ontologies\" Department of Industrial Engineering University of Toronto, Canada, MSA."},{"key":"e_1_3_2_1_13_1","article-title":"Formal Ontology and Information Systems, Formal John Y. J. and Gorman G. E. (2002), \"Internet use in South Korea","volume":"26","author":"Guarino N.","year":"1998","unstructured":"Guarino , N. , 1998 , Formal Ontology and Information Systems, Formal John Y. J. and Gorman G. E. (2002), \"Internet use in South Korea \", Online Information Review , Vol. 26 , Issue: 5, pp. 335--344. Guarino, N., 1998, Formal Ontology and Information Systems, Formal John Y. J. and Gorman G. E. (2002), \"Internet use in South Korea\", Online Information Review, Vol. 26, Issue: 5, pp. 335--344.","journal-title":"Online Information Review"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1108\/14684520210447903"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2008.159"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.877857"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0024-y"},{"key":"e_1_3_2_1_18_1","volume-title":"Enabling technology for knowledge sharing,\" AI Magazine","author":"Neches R.","year":"1991","unstructured":"Neches , R. , Fikes , R. E. , Finin , T. , Gruber , T. R. , Senator , T. and Swartout , W. R . ( 1991 ), \" Enabling technology for knowledge sharing,\" AI Magazine , Vol. 12 , No .3, pp:36--56. Neches, R., Fikes, R. E., Finin, T., Gruber, T. R., Senator, T. and Swartout, W. R. (1991), \"Enabling technology for knowledge sharing,\" AI Magazine, Vol.12, No.3, pp:36--56."},{"key":"e_1_3_2_1_19_1","first-page":"6837","volume-title":"Physica A","volume":"387","author":"Rhodes C.","year":"2008","unstructured":"Rhodes C. , and Nekovee M . ( 2008 ), \" Statistical Mechanics and its Applications \", Physica A , Vol. 387 , Issue 27 , pp. 6837 -- 6844 . Rhodes C., and Nekovee M. (2008), \"Statistical Mechanics and its Applications\", Physica A, Vol. 387, Issue 27, pp. 6837--6844."},{"key":"e_1_3_2_1_20_1","volume-title":"M. Gruninger, A. Gomez-Perez, M. Uschool&amp;ven der Vet P (Eds.) AAAI'97 Spring Symposium on Ontological Engineering, pp: 138--148.","author":"Swarout B.","year":"1997","unstructured":"Swarout , B. , Ramesh , P. Knight , K. and Russ , T . ( 1997 ), \" Toward distributed use of large-scale ontlolgy,\" In A. Farquhar , M. Gruninger, A. Gomez-Perez, M. Uschool&amp;ven der Vet P (Eds.) AAAI'97 Spring Symposium on Ontological Engineering, pp: 138--148. Swarout, B., Ramesh, P. Knight, K. and Russ, T. (1997), \"Toward distributed use of large-scale ontlolgy,\" In A. Farquhar, M. Gruninger, A. Gomez-Perez, M. Uschool&amp;ven der Vet P (Eds.) AAAI'97 Spring Symposium on Ontological Engineering, pp: 138--148."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0022-0"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888900007797"},{"key":"e_1_3_2_1_23_1","volume-title":"Workshop on Basic Ontological Issues in Knowledge Sharing, International Joint Conference on AI (IJCAI-95)","author":"Uschold M.","year":"1995","unstructured":"Uschold , M. and King , M . ( 1995 ), \" Towards a Methodology for Building Ontologies \", Workshop on Basic Ontological Issues in Knowledge Sharing, International Joint Conference on AI (IJCAI-95) , Canada. Uschold, M. and King, M. (1995), \"Towards a Methodology for Building Ontologies\", Workshop on Basic Ontological Issues in Knowledge Sharing, International Joint Conference on AI (IJCAI-95), Canada."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJMC.2007.012397"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11527725_7"},{"key":"e_1_3_2_1_26_1","first-page":"671","volume-title":"Computers&amp;Security, 20","author":"Zenkin D.","year":"2001","unstructured":"Zenkin , D. , ( 2001 ), \" Guidelines for the Protecting the Corporate against Viruses \", Computers&amp;Security, 20 , pp. 671 -- 675 . Zenkin, D., (2001), \"Guidelines for the Protecting the Corporate against Viruses\", Computers&amp;Security, 20, pp.671--675."},{"key":"e_1_3_2_1_27_1","volume-title":"Formal ontology and information system\"","author":"Guarino N.","year":"1998","unstructured":"Guarino , N. ( 1998 ) \" Formal ontology and information system\" available at http:\/\/www.loa-cnr.it\/Papers\/FOIS98.pdf. Guarino, N. (1998) \"Formal ontology and information system\" available at http:\/\/www.loa-cnr.it\/Papers\/FOIS98.pdf."},{"key":"e_1_3_2_1_28_1","volume-title":"white paper","author":"Trend Micro","year":"2006","unstructured":"Trend Micro , white paper ( 2006 ), \"The trend of threats today: 2005 Annual Roundup and 2006 Forecast \", Available at: http:\/\/www.pressebox.de\/attachment\/12230\/TM_PI_Virenr eport_2005.pdf Trend Micro, white paper (2006), \"The trend of threats today: 2005 Annual Roundup and 2006 Forecast\", Available at: http:\/\/www.pressebox.de\/attachment\/12230\/TM_PI_Virenr eport_2005.pdf"},{"key":"e_1_3_2_1_29_1","volume-title":"white paper","author":"Trend Micro","year":"2007","unstructured":"Trend Micro , white paper ( 2007 ), \"The trend of threats today: 2007 Annual Roundup and 2008 Forecast \", Available at: http:\/\/us.trendmicro.com\/imperia\/md\/content\/us\/pdf\/threats \/securitylibrary\/tre_threat_report.pdf. Trend Micro, white paper (2007), \"The trend of threats today: 2007 Annual Roundup and 2008 Forecast\", Available at: http:\/\/us.trendmicro.com\/imperia\/md\/content\/us\/pdf\/threats \/securitylibrary\/tre_threat_report.pdf."},{"key":"e_1_3_2_1_30_1","volume-title":"Kaspersky Security Bulletin 2006: Mobile malware\" http:\/\/www.viruslist.com\/en\/analysis?pubid=204791922","author":"Kaspersky","year":"2007","unstructured":"Kaspersky ( 2007 ), \" Kaspersky Security Bulletin 2006: Mobile malware\" http:\/\/www.viruslist.com\/en\/analysis?pubid=204791922 Kaspersky (2007), \"Kaspersky Security Bulletin 2006: Mobile malware\" http:\/\/www.viruslist.com\/en\/analysis?pubid=204791922"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1996.0096"},{"key":"e_1_3_2_1_32_1","volume-title":"YMIR: An ontology for engineering design. Unpublished doctoral dissertation","author":"Alberts L. K.","year":"1993","unstructured":"Alberts , L. K. ( 1993 ). YMIR: An ontology for engineering design. Unpublished doctoral dissertation , University of Twente , Netherlands. Alberts, L. K. (1993). YMIR: An ontology for engineering design. Unpublished doctoral dissertation, University of Twente, Netherlands."},{"key":"e_1_3_2_1_33_1","volume-title":"International Conference on formal ontology in information system Trento, Italy.","author":"Guarino N.","year":"1998","unstructured":"Guarino , N. ( 1998 , June). Formal ontology and information system. In N. Guarino (Chair) , International Conference on formal ontology in information system Trento, Italy. Guarino, N. (1998, June). Formal ontology and information system. In N. Guarino (Chair), International Conference on formal ontology in information system Trento, Italy."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/345508.345566"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/505168.505201"}],"event":{"name":"ICIS '09: The 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","sponsor":["AICIT","ETRI","KISTI"],"location":"Seoul Korea","acronym":"ICIS '09"},"container-title":["Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656098","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1655925.1656098","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:13Z","timestamp":1750250473000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656098"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,24]]},"references-count":34,"alternative-id":["10.1145\/1655925.1656098","10.1145\/1655925"],"URL":"https:\/\/doi.org\/10.1145\/1655925.1656098","relation":{},"subject":[],"published":{"date-parts":[[2009,11,24]]},"assertion":[{"value":"2009-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}