{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:18Z","timestamp":1750306278271,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905214","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"1-3","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Smartphone Security"],"prefix":"10.1145","author":[{"given":"Vikash","family":"Singh","sequence":"first","affiliation":[{"name":"Schools of CSE, Galgotias University, Greater Noida, U.P., India"}]},{"given":"Kavita","family":"Sharma","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, National Institute of Technology, Kurukshetra, Haryana, India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.288"},{"key":"e_1_3_2_1_2_1","volume-title":"P.R.Patil.","author":"Dongre Miss Ashwini A.","year":"2015","unstructured":"Miss Ashwini A. Dongre , prof C.J.Shelke , P.R.Patil. 2015 . Review of malware defense in mobile network using dynamic analysis of Android application. volume 3 , issue 3, 1625--1629 Miss Ashwini A. Dongre, prof C.J.Shelke, P.R.Patil. 2015. Review of malware defense in mobile network using dynamic analysis of Android application. volume 3, issue 3, 1625--1629"},{"key":"e_1_3_2_1_3_1","article-title":"Smartphone security","volume":"5","author":"Mahesh Poornima","year":"2015","unstructured":"Poornima Mahesh , Ashwini jayawant, Geetanjali Kale . 2015 . Smartphone security : Review of Attacks, Detection and Prevention. Volume 5 , Issue 3, 141--145 Poornima Mahesh, Ashwini jayawant, Geetanjali Kale. 2015. Smartphone security: Review of Attacks, Detection and Prevention. Volume 5, Issue 3, 141--145","journal-title":"Review of Attacks, Detection and Prevention."},{"key":"e_1_3_2_1_4_1","volume-title":"Black Hat USA","author":"Nohl K.","year":"2010","unstructured":"K. Nohl . 2010 . Attacking phone privacy . Presented at Black Hat USA 2010, Las Vegas, 1--6. K. Nohl. 2010. Attacking phone privacy. Presented at Black Hat USA 2010, Las Vegas, 1--6."},{"key":"e_1_3_2_1_5_1","unstructured":"O. Kharif. 2012. Mobile Spam Texts Hit 4.5 billion Raising consumer Ire. Bloomberg Businessweek. O. Kharif. 2012. Mobile Spam Texts Hit 4.5 billion Raising consumer Ire. Bloomberg Businessweek."},{"key":"e_1_3_2_1_6_1","unstructured":"Z. Lackey L. Miras. 2009. Attacking SMS. BlackHat USA RingZero ISEC Partners. Z. Lackey L. Miras. 2009. Attacking SMS. BlackHat USA RingZero ISEC Partners."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Ryan Farmer. 2012. A Brief Guide to Android Security. Ryan Farmer. 2012. A Brief Guide to Android Security.","DOI":"10.1016\/S1353-4858(12)70040-5"},{"key":"e_1_3_2_1_8_1","unstructured":"Hiroshi Lockheimer. 2012. Android and Security. URL: http:\/\/googlemobile.blogspot.com\/2012\/02\/android-and-security.html Hiroshi Lockheimer. 2012. Android and Security. URL: http:\/\/googlemobile.blogspot.com\/2012\/02\/android-and-security.html"},{"volume-title":"4th International Conference on In Malicious and Unwanted Software (MALWARE), 1--7.","author":"Schmidt Aubrey-Derrick","key":"e_1_3_2_1_9_1","unstructured":"Aubrey-Derrick Schmidt , Hans-Gunther Schmidt , L. Batyuk , J. Clausen , S. Camtepe , S. Albayrak , and C. Yildizli . 2009. Smartphone malware evolution revisited: Android next target? 4th International Conference on In Malicious and Unwanted Software (MALWARE), 1--7. Aubrey-Derrick Schmidt, Hans-Gunther Schmidt, L. Batyuk, J. Clausen, S. Camtepe, S. Albayrak, and C. Yildizli. 2009. Smartphone malware evolution revisited: Android next target? 4th International Conference on In Malicious and Unwanted Software (MALWARE), 1--7."},{"key":"e_1_3_2_1_10_1","unstructured":"DalvikVM.com http:\/\/www.dalvikvm.com\/. DalvikVM.com http:\/\/www.dalvikvm.com\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Google. Permissions|Android Develop- ers. Google. Apr. 14 2013. URL: http:\/\/developer.android.com\/guide\/topics\/security\/permissions.html Google. Permissions|Android Develop- ers. Google. Apr. 14 2013. URL: http:\/\/developer.android.com\/guide\/topics\/security\/permissions.html"},{"key":"e_1_3_2_1_12_1","unstructured":"Rich Cannings. 2011. An Update on Android Market Security. Google. Rich Cannings. 2011. An Update on Android Market Security. Google."},{"key":"e_1_3_2_1_13_1","volume-title":"50th Golden Jubilee Annual Convention","author":"Sharma Kavita","year":"2015","unstructured":"Kavita Sharma , B.B. Gupta . 2015 . Attack in Smartphone Wi-Fi Access Channel: State-of art, Current Issues and Challenges. Computer Society of India (CSI) , 50th Golden Jubilee Annual Convention , Springer, New Delhi , 2-5 Dec. 2015. Kavita Sharma, B.B. Gupta. 2015. Attack in Smartphone Wi-Fi Access Channel: State-of art, Current Issues and Challenges. Computer Society of India (CSI), 50th Golden Jubilee Annual Convention, Springer, New Delhi, 2-5 Dec. 2015."},{"key":"e_1_3_2_1_14_1","volume-title":"Multi-layer Defense against Malware Attacks on Smartphone Wi-Fi Access Channel\" 1st Elsevier International Conference on Information Security and Privacy (ICISP","author":"Sharma Kavita","year":"2015","unstructured":"Kavita Sharma , B.B. Gupta . 2015. Multi-layer Defense against Malware Attacks on Smartphone Wi-Fi Access Channel\" 1st Elsevier International Conference on Information Security and Privacy (ICISP 2015 ), Elsevier Procedia CS , Nagpur , 11-12 December, 2015. Kavita Sharma, B.B.Gupta. 2015. Multi-layer Defense against Malware Attacks on Smartphone Wi-Fi Access Channel\" 1st Elsevier International Conference on Information Security and Privacy (ICISP 2015), Elsevier Procedia CS, Nagpur, 11-12 December, 2015."}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905214","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905214","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:50Z","timestamp":1750221530000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905214"}},"subtitle":["Review of Challenges and Solution"],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":14,"alternative-id":["10.1145\/2905055.2905214","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905214","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}