{"id":"https://openalex.org/W2102975450","doi":"https://doi.org/10.1007/978-3-319-20376-8_34","title":"Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System","display_name":"Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2102975450","doi":"https://doi.org/10.1007/978-3-319-20376-8_34","mag":"2102975450"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-20376-8_34","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-20376-8_34","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://eprints.uwe.ac.uk/29781/","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112604661","display_name":"Shancang Li","orcid":"https://orcid.org/0000-0001-5663-7420"},"institutions":[{"id":"https://openalex.org/I251738","display_name":"Edinburgh Napier University","ror":"https://ror.org/03zjvnn91","country_code":"GB","type":"education","lineage":["https://openalex.org/I251738"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Shancang Li","raw_affiliation_strings":["School of Computing, Edinburgh Napier University, Edinburgh, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Edinburgh Napier University, Edinburgh, UK","institution_ids":["https://openalex.org/I251738"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100636763","display_name":"Junhua Chen","orcid":"https://orcid.org/0000-0002-0947-6879"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Junhua Chen","raw_affiliation_strings":["Cryptography Group, University of Bristol, Bristol, UK"],"affiliations":[{"raw_affiliation_string":"Cryptography Group, University of Bristol, Bristol, UK","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025514379","display_name":"Theodoros Spyridopoulos","orcid":"https://orcid.org/0000-0001-7575-9909"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Theodoros Spyridopoulos","raw_affiliation_strings":["Cryptography Group, University of Bristol, Bristol, UK"],"affiliations":[{"raw_affiliation_string":"Cryptography Group, University of Bristol, Bristol, UK","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034683400","display_name":"Panagiotis Andriotis","orcid":"https://orcid.org/0000-0002-3490-3123"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Panagiotis Andriotis","raw_affiliation_strings":["Cryptography Group, University of Bristol, Bristol, UK"],"affiliations":[{"raw_affiliation_string":"Cryptography Group, University of Bristol, Bristol, UK","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008952606","display_name":"Robert Ludwiniak","orcid":null},"institutions":[{"id":"https://openalex.org/I251738","display_name":"Edinburgh Napier University","ror":"https://ror.org/03zjvnn91","country_code":"GB","type":"education","lineage":["https://openalex.org/I251738"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Robert Ludwiniak","raw_affiliation_strings":["School of Computing, Edinburgh Napier University, Edinburgh, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Edinburgh Napier University, Edinburgh, UK","institution_ids":["https://openalex.org/I251738"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050277773","display_name":"Gordon Russell","orcid":"https://orcid.org/0000-0002-3589-3051"},"institutions":[{"id":"https://openalex.org/I251738","display_name":"Edinburgh Napier University","ror":"https://ror.org/03zjvnn91","country_code":"GB","type":"education","lineage":["https://openalex.org/I251738"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Gordon Russell","raw_affiliation_strings":["School of Computing, Edinburgh Napier University, Edinburgh, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Edinburgh Napier University, Edinburgh, UK","institution_ids":["https://openalex.org/I251738"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5112604661"],"corresponding_institution_ids":["https://openalex.org/I251738"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":2.5837,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.90070922,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"379","last_page":"390"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9818999767303467,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6711098551750183},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6277836561203003},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5672147274017334},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5203251838684082},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.4331231117248535},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.41372185945510864},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.24919715523719788},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.05175834894180298}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6711098551750183},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6277836561203003},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5672147274017334},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5203251838684082},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.4331231117248535},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.41372185945510864},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.24919715523719788},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.05175834894180298},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":8,"locations":[{"id":"doi:10.1007/978-3-319-20376-8_34","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-20376-8_34","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:eprints.ucl.ac.uk.OAI2:1479402","is_oa":false,"landing_page_url":"http://discovery.ucl.ac.uk/1479402/","pdf_url":null,"source":{"id":"https://openalex.org/S4306400024","display_name":"UCL Discovery (University College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45129253","host_organization_name":"University College London","host_organization_lineage":["https://openalex.org/I45129253"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"     In: Tryfonas, T and Askoxylakis, IG, (eds.)   (pp. pp. 379-390).  Springer (2015)     ","raw_type":"Proceedings paper"},{"id":"pmh:oai:eprints.uwe.ac.uk:29781","is_oa":true,"landing_page_url":"http://eprints.uwe.ac.uk/29781/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401464","display_name":"UWE Research Repository (UWE Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I178535277","host_organization_name":"University of the West of England","host_organization_lineage":["https://openalex.org/I178535277"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"},{"id":"pmh:oai:https://orca.cardiff.ac.uk:153612","is_oa":false,"landing_page_url":"https://orca.cardiff.ac.uk/id/eprint/153612/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401195","display_name":"ORCA Online Research @Cardiff (Cardiff University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79510175","host_organization_name":"Cardiff University","host_organization_lineage":["https://openalex.org/I79510175"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"},{"id":"pmh:oai:napier-surface.worktribe.com:173705","is_oa":false,"landing_page_url":"http://researchrepository.napier.ac.uk/id/eprint/8755","pdf_url":null,"source":{"id":"https://openalex.org/S4306400544","display_name":"Research Output (Edinburgh Napier University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I251738","host_organization_name":"Edinburgh Napier University","host_organization_lineage":["https://openalex.org/I251738"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Proceeding"},{"id":"pmh:oai:pure.atira.dk:openaire_cris_publications/8efea757-55fa-4168-8d89-194704b41829","is_oa":false,"landing_page_url":"https://research.birmingham.ac.uk/en/publications/8efea757-55fa-4168-8d89-194704b41829","pdf_url":null,"source":{"id":"https://openalex.org/S4306402634","display_name":"University of Birmingham Research Portal (University of Birmingham)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79619799","host_organization_name":"University of Birmingham","host_organization_lineage":["https://openalex.org/I79619799"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Li, S, Chen, J, Spyridopoulos, T, Andriotis, P, Ludwiniak, R & Russell, G 2015, Real-time monitoring of privacy abuses and intrusion detection in android system. vol. 9190. https://doi.org/10.1007/978-3-319-20376-8_34","raw_type":"book"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/263efd31-cea7-427d-bf7b-cdc5f4f16b4a","is_oa":false,"landing_page_url":"https://hdl.handle.net/1983/263efd31-cea7-427d-bf7b-cdc5f4f16b4a","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Li , S , Chen , J , Spyridopoulos , T , Andriotis , P , Ludwiniak , R &amp; Russell , G 2015 , Real-time Monitoring of Privacy Abuses and Intrusion Detection in Android System . in 3rd International Conference on Human Aspects of Information Security, Privacy and Trust . vol. 9190 , Springer Berlin Heidelberg , pp. 379-390 . https://doi.org/10.1007/978-3-319-20376-8_34","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/263efd31-cea7-427d-bf7b-cdc5f4f16b4a","is_oa":false,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/263efd31-cea7-427d-bf7b-cdc5f4f16b4a","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Li, S, Chen, J, Spyridopoulos, T, Andriotis, P, Ludwiniak, R & Russell, G 2015, Real-time Monitoring of Privacy Abuses and Intrusion Detection in Android System. in 3rd International Conference on Human Aspects of Information Security, Privacy and Trust. vol. 9190, Springer Berlin Heidelberg, pp. 379-390. https://doi.org/10.1007/978-3-319-20376-8_34","raw_type":"contributionToPeriodical"}],"best_oa_location":{"id":"pmh:oai:eprints.uwe.ac.uk:29781","is_oa":true,"landing_page_url":"http://eprints.uwe.ac.uk/29781/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401464","display_name":"UWE Research Repository (UWE Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I178535277","host_organization_name":"University of the West of England","host_organization_lineage":["https://openalex.org/I178535277"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8199999928474426}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W25021988","https://openalex.org/W2024385792","https://openalex.org/W2055622776","https://openalex.org/W2105871282","https://openalex.org/W2110213347","https://openalex.org/W2140679274","https://openalex.org/W2157303969","https://openalex.org/W2295172143","https://openalex.org/W4205883593"],"related_works":["https://openalex.org/W2388271354","https://openalex.org/W2415288834","https://openalex.org/W2378891550","https://openalex.org/W3036769282","https://openalex.org/W2765997805","https://openalex.org/W2374211671","https://openalex.org/W2362311214","https://openalex.org/W2517190875","https://openalex.org/W2968574493","https://openalex.org/W2136041290"],"abstract_inverted_index":null,"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
