{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:32:13Z","timestamp":1761708733679,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,12,5]],"date-time":"2011-12-05T00:00:00Z","timestamp":1323043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,12,5]]},"DOI":"10.1145\/2095697.2095750","type":"proceedings-article","created":{"date-parts":[[2012,1,17]],"date-time":"2012-01-17T17:20:41Z","timestamp":1326820841000},"page":"256-259","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Mobile phones security"],"prefix":"10.1145","author":[{"given":"Mohamed","family":"Ghallali","sequence":"first","affiliation":[{"name":"Abdelmalek Essaadi University, Tetouan, Morocco"}]},{"given":"Driss","family":"El Ouadghiri","sequence":"additional","affiliation":[{"name":"Moulay Ismail University, Meknes, Morocco"}]},{"given":"Mohammad","family":"Essaaidi","sequence":"additional","affiliation":[{"name":"Abdelmalek Essaadi University, Tetouan, Morocco"}]},{"given":"Mohamed","family":"Boulmalf","sequence":"additional","affiliation":[{"name":"International University of Rabat, Rabat, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2011,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Retrieved on October 2011 from http:\/\/cellphones.org\/blog\/cell-phone-generations\/.  Retrieved on October 2011 from http:\/\/cellphones.org\/blog\/cell-phone-generations\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Morgan Stanley Research: Blackberry security group Smartphone security.  Morgan Stanley Research: Blackberry security group Smartphone security ."},{"key":"e_1_3_2_1_3_1","unstructured":"Retrieved on October 2011 from http:\/\/f-secure.com\/v-descs\/commwarrior.shtml  Retrieved on October 2011 from http:\/\/f-secure.com\/v-descs\/commwarrior.shtml"},{"key":"e_1_3_2_1_4_1","unstructured":"Retrieved on October 2011 from http:\/\/www.f-secure.com\/v-descs\/flexispy_a.shtml  Retrieved on October 2011 from http:\/\/www.f-secure.com\/v-descs\/flexispy_a.shtml"},{"key":"e_1_3_2_1_5_1","unstructured":"Retrieved on October 2011 from http:\/\/f-secure.com\/v-descs\/cabir.shtml  Retrieved on October 2011 from http:\/\/f-secure.com\/v-descs\/cabir.shtml"},{"key":"e_1_3_2_1_6_1","unstructured":"Retrieved on October 2011 from http:\/\/f-secure.com\/v-descs\/inqtana_a.shtml  Retrieved on October 2011 from http:\/\/f-secure.com\/v-descs\/inqtana_a.shtml"},{"key":"e_1_3_2_1_7_1","unstructured":"Aubrey-Derrick Schmidt and Sahin Albayrak 2008. Malicious Software for Smartphone.  Aubrey-Derrick Schmidt and Sahin Albayrak 2008. Malicious Software for Smartphone ."},{"key":"e_1_3_2_1_8_1","unstructured":"Feng Li Yinying Yang Jie Wu.2010. CPMC: an efficient proximity Malwares Coping Scheme in Smartphone-based Mobile Networks.  Feng Li Yinying Yang Jie Wu.2010. CPMC: an efficient proximity Malwares Coping Scheme in Smartphone-based Mobile Networks ."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Shin-Ming Cheng Member IEEE Weng Chon Ao Pin-Yu Chen and Kwang-Cheng Chen Fellow IEEE. 2010.mobile Malware Propagation in Generalized Social Networks. Technical Program at IEEE INFOCOM.  Shin-Ming Cheng Member IEEE Weng Chon Ao Pin-Yu Chen and Kwang-Cheng Chen Fellow IEEE. 2010.mobile Malware Propagation in Generalized Social Networks. Technical Program at IEEE INFOCOM .","DOI":"10.1109\/LCOMM.2010.01.100830"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359550"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Muthukumaran Sawani Schiffman Jung Jaeger.2008 Measuring integrity on mobile phone systems.  Muthukumaran Sawani Schiffman Jung Jaeger.2008 Measuring integrity on mobile phone systems .","DOI":"10.1145\/1377836.1377862"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Zhang X. Aciicmez O. Seifert J. P.2009 \"Building efficient integrity measurement and attestation for mobile phone platforms.  Zhang X. Aciicmez O. Seifert J. P.2009 \" Building efficient integrity measurement and attestation for mobile phone platforms .","DOI":"10.1007\/978-3-642-04434-2_7"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Liu L. Yan G. Zhang X. Chen S.2009. Virus meter: Preventing your cell phone from spies.  Liu L. Yan G. Zhang X. Chen S.2009. Virus meter: Preventing your cell phone from spies .","DOI":"10.1007\/978-3-642-04342-0_13"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Kim H. Smith J. Shin K. G. 2008 \"Detecting energy-greedy anomalies and mobile malware variants.  Kim H. Smith J. Shin K. G. 2008 \" Detecting energy-greedy anomalies and mobile malware variants .","DOI":"10.1145\/1378600.1378627"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Qiang Yan Robert H. Deng Yingjiu Li and Tieyan Li. 2010 On the potential of limitation oriented Malware Detection and Prevention Techniques on Mobile Phones. International Journal of Security and Its Applications  Qiang Yan Robert H. Deng Yingjiu Li and Tieyan Li. 2010 On the potential of limitation oriented Malware Detection and Prevention Techniques on Mobile Phones . International Journal of Security and Its Applications","DOI":"10.1007\/978-3-642-10847-1_30"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Liang Xie Xinwen Zhang Ashwin Chaugule Trent Jaeger Sencun Zhu. 2009. Designing System-level Defenses against Cellphone Malware.  Liang Xie Xinwen Zhang Ashwin Chaugule Trent Jaeger Sencun Zhu. 2009. Designing System-level Defenses against Cellphone Malware .","DOI":"10.1109\/SRDS.2009.21"},{"key":"e_1_3_2_1_17_1","unstructured":"Guanhua Yan Leticia Cuellar Stephan Eidenbenz Nicolas Hengartner 2009 Blue-Watchdog: Detecting Bluetooth Worm Propagation in Public Area.  Guanhua Yan Leticia Cuellar Stephan Eidenbenz Nicolas Hengartner 2009 Blue-Watchdog: Detecting Bluetooth Worm Propagation in Public Area ."}],"event":{"name":"MoMM '11: The 9th International Conference on Advances in Mobile Computing & Multimedia","acronym":"MoMM '11","location":"Ho Chi Minh City Vietnam"},"container-title":["Proceedings of the 9th International Conference on Advances in Mobile Computing and Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2095697.2095750","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2095697.2095750","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:00Z","timestamp":1750243920000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2095697.2095750"}},"subtitle":["the spread of malware via MMS and Bluetooth, prevention methods"],"short-title":[],"issued":{"date-parts":[[2011,12,5]]},"references-count":17,"alternative-id":["10.1145\/2095697.2095750","10.1145\/2095697"],"URL":"https:\/\/doi.org\/10.1145\/2095697.2095750","relation":{},"subject":[],"published":{"date-parts":[[2011,12,5]]},"assertion":[{"value":"2011-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}