{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:30:57Z","timestamp":1750307457603,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,4,21]],"date-time":"2010-04-21T00:00:00Z","timestamp":1271808000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,4,21]]},"DOI":"10.1145\/1852666.1852696","type":"proceedings-article","created":{"date-parts":[[2010,8,31]],"date-time":"2010-08-31T13:06:04Z","timestamp":1283259964000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["SecureMyDroid"],"prefix":"10.1145","author":[{"given":"Alessandro","family":"Distefano","sequence":"first","affiliation":[{"name":"University of Rome \"Tor Vergata\", Rome, Italy"}]},{"given":"Antonio","family":"Grillo","sequence":"additional","affiliation":[{"name":"University of Rome \"Tor Vergata\", Rome, Italy"}]},{"given":"Alessandro","family":"Lentini","sequence":"additional","affiliation":[{"name":"University of Rome \"Tor Vergata\", Rome, Italy"}]},{"given":"Giuseppe F.","family":"Italiano","sequence":"additional","affiliation":[{"name":"University of Rome \"Tor Vergata\", Rome, Italy"}]}],"member":"320","published-online":{"date-parts":[[2010,4,21]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"internetnews.com","author":"Mottl","year":"2008","unstructured":"J. Mottl , My Cellphone, My Everything ... , internetnews.com , Jupitermedia Corporation , March 14, 2008 , available at http:\/\/www.internetnews.com\/mobility\/article.php\/3734366 J. Mottl, My Cellphone, My Everything..., internetnews.com, Jupitermedia Corporation, March 14, 2008, available at http:\/\/www.internetnews.com\/mobility\/article.php\/3734366"},{"volume-title":"Proceedings of SICHERHEIT 2008","author":"Becher M.","key":"e_1_3_2_2_2_1","unstructured":"Becher , M. , Freiling , F. , Towards Dynamic Malware Analysis to Increase Mobile Device Security . Proceedings of SICHERHEIT 2008 , 2008-04-02. Becher, M., Freiling, F., Towards Dynamic Malware Analysis to Increase Mobile Device Security. Proceedings of SICHERHEIT 2008, 2008-04-02."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.45"},{"key":"e_1_3_2_2_4_1","volume-title":"Mobile devices prone to identity theft","author":"Bowman B.","year":"2007","unstructured":"Bowman , B. , Mobile devices prone to identity theft . 2007 , available at http:\/\/www.pitblado.com\/lawyer_images\/WFP-ArticleAUG2007.pdf. Bowman, B., Mobile devices prone to identity theft. 2007, available at http:\/\/www.pitblado.com\/lawyer_images\/WFP-ArticleAUG2007.pdf."},{"key":"e_1_3_2_2_5_1","volume-title":"The 2004 International Conference on Security and Management (SAM'04)","author":"Jansen V.","year":"2004","unstructured":"W. Jansen , V. Korolev , S. Gavrila , T. Heute , C. S\u00e9veillac , A Unified Framework for Mobile Device Security , The 2004 International Conference on Security and Management (SAM'04) , June 2004 . W. Jansen, V. Korolev, S. Gavrila, T. Heute, C. S\u00e9veillac, A Unified Framework for Mobile Device Security, The 2004 International Conference on Security and Management (SAM'04), June 2004."},{"key":"e_1_3_2_2_6_1","volume-title":"April 7","author":"Apple Inc.","year":"2010","unstructured":"Apple Inc. , iPhone in Business , April 7 , 2010 , available at http:\/\/www.apple.com\/iphone\/business\/integration\/ Apple Inc., iPhone in Business, April 7, 2010, available at http:\/\/www.apple.com\/iphone\/business\/integration\/"},{"key":"e_1_3_2_2_7_1","volume-title":"April 7","author":"Research In Motion Ltd","year":"2010","unstructured":"Research In Motion Ltd . , BlackBerry Business Solutions , April 7 , 2010 , http:\/\/na.blackberry.com\/eng\/solutions Research In Motion Ltd., BlackBerry Business Solutions, April 7, 2010, http:\/\/na.blackberry.com\/eng\/solutions"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-78172-1","volume-title":"Product Lifecycle Management","author":"S\u00e4\u00e4ksvuori A.","year":"2008","unstructured":"A. S\u00e4\u00e4ksvuori , A. Immonen , Product Lifecycle Management , Springer , Third Ed . 2008 A. S\u00e4\u00e4ksvuori, A. Immonen, Product Lifecycle Management, Springer, Third Ed. 2008"}],"event":{"name":"CSIIRW '10: Annual Cyber Security and Information Intelligence Research Workshop","acronym":"CSIIRW '10","location":"Oak Ridge Tennessee USA"},"container-title":["Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1852666.1852696","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1852666.1852696","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:08:18Z","timestamp":1750248498000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1852666.1852696"}},"subtitle":["enforcing security in the mobile devices lifecycle"],"short-title":[],"issued":{"date-parts":[[2010,4,21]]},"references-count":8,"alternative-id":["10.1145\/1852666.1852696","10.1145\/1852666"],"URL":"https:\/\/doi.org\/10.1145\/1852666.1852696","relation":{},"subject":[],"published":{"date-parts":[[2010,4,21]]},"assertion":[{"value":"2010-04-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}