{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:13:35Z","timestamp":1730344415368,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.23919\/inm.2017.7987434","type":"proceedings-article","created":{"date-parts":[[2017,7,24]],"date-time":"2017-07-24T16:32:03Z","timestamp":1500913923000},"page":"1034-1039","source":"Crossref","is-referenced-by-count":12,"title":["Towards a Hybrid Intrusion Detection System for Android-based PPDR terminals"],"prefix":"10.23919","author":[{"given":"Pedro","family":"Borges","sequence":"first","affiliation":[]},{"given":"Bruno","family":"Sousa","sequence":"additional","affiliation":[]},{"given":"Luis","family":"Ferreira","sequence":"additional","affiliation":[]},{"given":"Firooz B.","family":"Saghezchi","sequence":"additional","affiliation":[]},{"given":"Georgios","family":"Mantas","sequence":"additional","affiliation":[]},{"given":"Jose","family":"Ribeiro","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Rodriguez","sequence":"additional","affiliation":[]},{"given":"Luis","family":"Cordeiro","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Simoes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"29","article-title":"Droidscope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis","author":"yan","year":"2012","journal-title":"Proceedings of the 21st USENIX Security Symposium"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0148-x"},{"key":"ref12","first-page":"5","article-title":"Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets","author":"zhou","year":"2012","journal-title":"19th NDSS"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480701"},{"key":"ref14","first-page":"1","article-title":"TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones","volume":"49","author":"enck","year":"2010","journal-title":"OSDI'10"},{"journal-title":"Droidbox","year":"2012","author":"lantz","key":"ref15"},{"journal-title":"Esper Correlation Engine","year":"0","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2014.7038797"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CITA.2011.5999520"},{"key":"ref4","first-page":"1","author":"alcatel-lucent","year":"2015","journal-title":"MALWARE"},{"journal-title":"Next Generation Communication Systems for PPDR - The SALUS Perspective","year":"2015","key":"ref3"},{"key":"ref6","first-page":"998","volume":"17","author":"faruki","year":"2015","journal-title":"Android Security A Survey of Issues Malware Penetrarion and Defenses"},{"journal-title":"Risk Management Guide for Information Security","article-title":"NIST Special Publication 800&#x2013;30 Revision 1","year":"2012","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2523514.2523539"},{"journal-title":"IDC_ Smartphone OS Market Share 2015 2014 2013 and 2012","year":"2015","key":"ref2"},{"journal-title":"Protect against harmful apps","year":"0","key":"ref9"},{"journal-title":"Tech Rep","article-title":"The World in 2015 ICT Facts & Figures","year":"2015","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IFITA.2009.34"},{"journal-title":"Tech Rep","article-title":"Threat Report H1 2013","year":"2013","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.02.009"},{"journal-title":"Testing Support Library (UI Automator)","year":"0","key":"ref24"},{"journal-title":"Android Hehe","year":"2014","key":"ref23"},{"journal-title":"AnotherMonitor","year":"2016","author":"redondo","key":"ref25"}],"event":{"name":"2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM)","start":{"date-parts":[[2017,5,8]]},"location":"Lisbon, Portugal","end":{"date-parts":[[2017,5,12]]}},"container-title":["2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7976714\/7987228\/07987434.pdf?arnumber=7987434","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T11:35:20Z","timestamp":1502883320000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7987434\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":25,"URL":"https:\/\/doi.org\/10.23919\/inm.2017.7987434","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}