{"id":"https://openalex.org/W1594396784","doi":"https://doi.org/10.1007/s11036-008-0113-x","title":"Monitoring Smartphones for Anomaly Detection","display_name":"Monitoring Smartphones for Anomaly Detection","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W1594396784","doi":"https://doi.org/10.1007/s11036-008-0113-x","mag":"1594396784"},"language":"en","primary_location":{"id":"doi:10.1007/s11036-008-0113-x","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11036-008-0113-x","pdf_url":null,"source":{"id":"https://openalex.org/S192894947","display_name":"Mobile Networks and Applications","issn_l":"1383-469X","issn":["1383-469X","1572-8153"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Mobile Networks and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://eudl.eu/pdf/10.4108/ICST.MOBILWARE2008.2492","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110669964","display_name":"Aubrey-Derrick Schmidt","orcid":null},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Aubrey-Derrick Schmidt","raw_affiliation_strings":["DAI-Labor Technische Universitt Berlin","DAI-Labor Technische Universit\u00e4t Berlin, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"DAI-Labor Technische Universitt Berlin","institution_ids":["https://openalex.org/I4577782"]},{"raw_affiliation_string":"DAI-Labor Technische Universit\u00e4t Berlin, Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076475493","display_name":"Frank Peters","orcid":null},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Frank Peters","raw_affiliation_strings":["DAI-Labor Technische Universitt Berlin","DAI-Labor Technische Universit\u00e4t Berlin, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"DAI-Labor Technische Universitt Berlin","institution_ids":["https://openalex.org/I4577782"]},{"raw_affiliation_string":"DAI-Labor Technische Universit\u00e4t Berlin, Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012874958","display_name":"Florian Lamour","orcid":null},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Florian Lamour","raw_affiliation_strings":["DAI-Labor Technische Universitt Berlin","DAI-Labor Technische Universit\u00e4t Berlin, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"DAI-Labor Technische Universitt Berlin","institution_ids":["https://openalex.org/I4577782"]},{"raw_affiliation_string":"DAI-Labor Technische Universit\u00e4t Berlin, Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089847337","display_name":"\u015eahin Albayrak","orcid":"https://orcid.org/0000-0001-5092-4584"},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Sahin Albayrak","raw_affiliation_strings":["DAI-Labor Technische Universitt Berlin","DAI-Labor Technische Universit\u00e4t Berlin, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"DAI-Labor Technische Universitt Berlin","institution_ids":["https://openalex.org/I4577782"]},{"raw_affiliation_string":"DAI-Labor Technische Universit\u00e4t Berlin, Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5110669964"],"corresponding_institution_ids":["https://openalex.org/I4577782"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.0557954,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"14","issue":"1","first_page":"92","last_page":"106"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.9544000029563904,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7136335372924805},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6213062405586243},{"id":"https://openalex.org/keywords/mobile-phone","display_name":"Mobile phone","score":0.6003690958023071},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5428540706634521},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.5408286452293396},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5122982263565063},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4947449862957001},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.48331332206726074},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2589207887649536},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.15514346957206726}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7136335372924805},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6213062405586243},{"id":"https://openalex.org/C2777421447","wikidata":"https://www.wikidata.org/wiki/Q17517","display_name":"Mobile phone","level":2,"score":0.6003690958023071},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5428540706634521},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.5408286452293396},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5122982263565063},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4947449862957001},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.48331332206726074},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2589207887649536},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.15514346957206726}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/s11036-008-0113-x","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11036-008-0113-x","pdf_url":null,"source":{"id":"https://openalex.org/S192894947","display_name":"Mobile Networks and Applications","issn_l":"1383-469X","issn":["1383-469X","1572-8153"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Mobile Networks and Applications","raw_type":"journal-article"},{"id":"doi:10.4108/icst.mobilware2008.2492","is_oa":true,"landing_page_url":"https://doi.org/10.4108/icst.mobilware2008.2492","pdf_url":"http://eudl.eu/pdf/10.4108/ICST.MOBILWARE2008.2492","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st International ICST Conference on Mobile Wireless Middleware, Operating Systems and Applications","raw_type":"proceedings-article"},{"id":"mag:1594396784","is_oa":false,"landing_page_url":"http://eprints.qut.edu.au/57359/","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":null},{"id":"mag:2030873663","is_oa":false,"landing_page_url":"http://www.dai-labor.de/fileadmin/files/publications/sf_monitoring_dai_page.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306420540","display_name":"Mobile Wireless Middleware, Operating Systems, and Applications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"Mobile Wireless Middleware, Operating Systems, and Applications","raw_type":null}],"best_oa_location":{"id":"doi:10.4108/icst.mobilware2008.2492","is_oa":true,"landing_page_url":"https://doi.org/10.4108/icst.mobilware2008.2492","pdf_url":"http://eudl.eu/pdf/10.4108/ICST.MOBILWARE2008.2492","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st International ICST Conference on Mobile Wireless Middleware, Operating Systems and Applications","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1594396784.pdf","grobid_xml":"https://content.openalex.org/works/W1594396784.grobid-xml"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W1543152427","https://openalex.org/W1983451630","https://openalex.org/W1988194087","https://openalex.org/W1994212665","https://openalex.org/W2023220308","https://openalex.org/W2058657545","https://openalex.org/W2064345126","https://openalex.org/W2075423963","https://openalex.org/W2118600187","https://openalex.org/W2118840832","https://openalex.org/W2129624205","https://openalex.org/W2132433561","https://openalex.org/W2147840338","https://openalex.org/W2154904465","https://openalex.org/W2155780111","https://openalex.org/W2166900809","https://openalex.org/W3021765847","https://openalex.org/W4237164190"],"related_works":["https://openalex.org/W3115694724","https://openalex.org/W2813995020","https://openalex.org/W2875795292","https://openalex.org/W2875868005","https://openalex.org/W2819155186","https://openalex.org/W2825090934","https://openalex.org/W1644109542","https://openalex.org/W3002965807","https://openalex.org/W2881532391","https://openalex.org/W2841943193","https://openalex.org/W2018231267","https://openalex.org/W2860895762","https://openalex.org/W2622542303","https://openalex.org/W2836972985","https://openalex.org/W2331082662","https://openalex.org/W2843233494","https://openalex.org/W2864795207","https://openalex.org/W2934921912","https://openalex.org/W2831407191","https://openalex.org/W2819993495"],"abstract_inverted_index":{"In":[0],"this":[1,41],"paper":[2],"we":[3],"demonstrate":[4],"how":[5,60],"to":[6,19,29,51,61,117],"monitor":[7],"a":[8,30,35,78,90,118],"smartphone":[9],"running":[10,34],"Symbian":[11],"operating":[12],"system":[13,39],"and":[14,53,65,93,100],"Windows":[15],"Mobile":[16],"in":[17,80],"order":[18],"extract":[20],"features":[21,26,64],"for":[22],"anomaly":[23],"detection.":[24],"These":[25],"are":[27,103],"sent":[28],"remote":[31],"server":[32],"because":[33],"complex":[36],"intrusion":[37],"detection":[38],"on":[40,59,77],"kind":[42],"of":[43,84,98,120,123,126],"mobile":[44,73],"device":[45],"still":[46],"is":[47,87],"not":[48],"feasible":[49],"due":[50],"capability":[52],"hardware":[54],"limitations.":[55],"We":[56],"give":[57],"examples":[58],"compute":[62],"relevant":[63],"introduce":[66],"the":[67,124],"top":[68],"ten":[69],"applications":[70,86],"used":[71],"by":[72,89],"phone":[74],"users":[75],"based":[76],"study":[79],"2005.":[81],"The":[82],"usage":[83],"these":[85],"recorded":[88],"monitoring":[91,96,107],"client":[92,108],"visualized.":[94],"Additionally,":[95],"results":[97],"public":[99],"self-written":[101],"malwares":[102],"shown.":[104],"For":[105],"improving":[106],"performance,":[109],"Principal":[110],"Component":[111],"Analysis":[112],"was":[113],"applied":[114],"which":[115],"lead":[116],"decrease":[119],"about":[121],"80%":[122],"amount":[125],"monitored":[127],"features.":[128]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2025-10-10T00:00:00"}
