{"id":"https://openalex.org/W2036551294","doi":"https://doi.org/10.1109/icccn.2014.6911814","title":"Feedback-based smartphone strategic sampling for BYOD security","display_name":"Feedback-based smartphone strategic sampling for BYOD security","publication_year":2014,"publication_date":"2014-08-01","ids":{"openalex":"https://openalex.org/W2036551294","doi":"https://doi.org/10.1109/icccn.2014.6911814","mag":"2036551294"},"language":"en","primary_location":{"id":"doi:10.1109/icccn.2014.6911814","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2014.6911814","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072183477","display_name":"Feng Li","orcid":"https://orcid.org/0000-0001-6957-5388"},"institutions":[{"id":"https://openalex.org/I135191193","display_name":"University of Indianapolis","ror":"https://ror.org/052133d12","country_code":"US","type":"education","lineage":["https://openalex.org/I135191193"]},{"id":"https://openalex.org/I55769427","display_name":"Indiana University \u2013 Purdue University Indianapolis","ror":"https://ror.org/05gxnyn08","country_code":"US","type":"education","lineage":["https://openalex.org/I55769427","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Feng Li","raw_affiliation_strings":["Department of Computer Information and Graphics Technology","Department of Computer Information and Graphics Technology, Indiana University-Purdue University Indianapolis, Indianapolis, IN, U.S.A"],"affiliations":[{"raw_affiliation_string":"Department of Computer Information and Graphics Technology","institution_ids":[]},{"raw_affiliation_string":"Department of Computer Information and Graphics Technology, Indiana University-Purdue University Indianapolis, Indianapolis, IN, U.S.A","institution_ids":["https://openalex.org/I135191193","https://openalex.org/I55769427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056673342","display_name":"Chin\u2010Tser Huang","orcid":"https://orcid.org/0000-0003-3983-972X"},"institutions":[{"id":"https://openalex.org/I135191193","display_name":"University of Indianapolis","ror":"https://ror.org/052133d12","country_code":"US","type":"education","lineage":["https://openalex.org/I135191193"]},{"id":"https://openalex.org/I155781252","display_name":"University of South Carolina","ror":"https://ror.org/02b6qw903","country_code":"US","type":"education","lineage":["https://openalex.org/I155781252"]},{"id":"https://openalex.org/I55769427","display_name":"Indiana University \u2013 Purdue University Indianapolis","ror":"https://ror.org/05gxnyn08","country_code":"US","type":"education","lineage":["https://openalex.org/I55769427","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chin-Tser Huang","raw_affiliation_strings":["Department of Computer and Information Science, Indiana University-Purdue University Indianapolis, Indianapolis, IN, U.S.A","Department of Computer Science and Engineering, University of South Carolina, Columbia, SC, U.S.A"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Science, Indiana University-Purdue University Indianapolis, Indianapolis, IN, U.S.A","institution_ids":["https://openalex.org/I135191193","https://openalex.org/I55769427"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, University of South Carolina, Columbia, SC, U.S.A","institution_ids":["https://openalex.org/I155781252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103264263","display_name":"Jie Huang","orcid":"https://orcid.org/0000-0002-8518-9468"},"institutions":[{"id":"https://openalex.org/I135191193","display_name":"University of Indianapolis","ror":"https://ror.org/052133d12","country_code":"US","type":"education","lineage":["https://openalex.org/I135191193"]},{"id":"https://openalex.org/I155781252","display_name":"University of South Carolina","ror":"https://ror.org/02b6qw903","country_code":"US","type":"education","lineage":["https://openalex.org/I155781252"]},{"id":"https://openalex.org/I55769427","display_name":"Indiana University \u2013 Purdue University Indianapolis","ror":"https://ror.org/05gxnyn08","country_code":"US","type":"education","lineage":["https://openalex.org/I55769427","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jie Huang","raw_affiliation_strings":["Department of Computer and Information Science, Indiana University-Purdue University Indianapolis, Indianapolis, IN, U.S.A","Department of Computer Science and Engineering, University of South Carolina, Columbia, SC, U.S.A"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Science, Indiana University-Purdue University Indianapolis, Indianapolis, IN, U.S.A","institution_ids":["https://openalex.org/I135191193","https://openalex.org/I55769427"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, University of South Carolina, Columbia, SC, U.S.A","institution_ids":["https://openalex.org/I155781252"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055023503","display_name":"Wei Peng","orcid":"https://orcid.org/0000-0002-9087-9551"},"institutions":[{"id":"https://openalex.org/I135191193","display_name":"University of Indianapolis","ror":"https://ror.org/052133d12","country_code":"US","type":"education","lineage":["https://openalex.org/I135191193"]},{"id":"https://openalex.org/I155781252","display_name":"University of South Carolina","ror":"https://ror.org/02b6qw903","country_code":"US","type":"education","lineage":["https://openalex.org/I155781252"]},{"id":"https://openalex.org/I55769427","display_name":"Indiana University \u2013 Purdue University Indianapolis","ror":"https://ror.org/05gxnyn08","country_code":"US","type":"education","lineage":["https://openalex.org/I55769427","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wei Peng","raw_affiliation_strings":["Department of Computer Science and Engineering, University of South Carolina, Columbia, SC, U.S.A","Department of Computer and Information Science, Indiana University-Purdue University, Indianapolis, Indianapolis, IN, U.S.A"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of South Carolina, Columbia, SC, U.S.A","institution_ids":["https://openalex.org/I155781252"]},{"raw_affiliation_string":"Department of Computer and Information Science, Indiana University-Purdue University, Indianapolis, Indianapolis, IN, U.S.A","institution_ids":["https://openalex.org/I135191193","https://openalex.org/I55769427"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5072183477"],"corresponding_institution_ids":["https://openalex.org/I135191193","https://openalex.org/I55769427"],"apc_list":null,"apc_paid":null,"fwci":0.2911,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.55332446,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7795406579971313},{"id":"https://openalex.org/keywords/bring-your-own-device","display_name":"Bring your own device","score":0.7773602604866028},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5572390556335449},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.557224690914154},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5528360605239868},{"id":"https://openalex.org/keywords/sampling","display_name":"Sampling (signal processing)","score":0.5412530303001404},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5060352683067322},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10524746775627136},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.0802900493144989}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7795406579971313},{"id":"https://openalex.org/C2778282719","wikidata":"https://www.wikidata.org/wiki/Q917419","display_name":"Bring your own device","level":3,"score":0.7773602604866028},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5572390556335449},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.557224690914154},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5528360605239868},{"id":"https://openalex.org/C140779682","wikidata":"https://www.wikidata.org/wiki/Q210868","display_name":"Sampling (signal processing)","level":3,"score":0.5412530303001404},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5060352683067322},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10524746775627136},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0802900493144989},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccn.2014.6911814","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2014.6911814","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5199999809265137,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W1593657937","https://openalex.org/W1775772884","https://openalex.org/W1820098372","https://openalex.org/W1910686388","https://openalex.org/W1956767865","https://openalex.org/W1964264424","https://openalex.org/W1968061803","https://openalex.org/W1978063312","https://openalex.org/W1978158724","https://openalex.org/W1990471574","https://openalex.org/W2001163651","https://openalex.org/W2002169759","https://openalex.org/W2003236223","https://openalex.org/W2024200844","https://openalex.org/W2031418724","https://openalex.org/W2059134215","https://openalex.org/W2068211976","https://openalex.org/W2087766914","https://openalex.org/W2101077503","https://openalex.org/W2108673751","https://openalex.org/W2111562542","https://openalex.org/W2115669089","https://openalex.org/W2117030266","https://openalex.org/W2120215974","https://openalex.org/W2137365926","https://openalex.org/W2138884820","https://openalex.org/W2143759259","https://openalex.org/W2156453323","https://openalex.org/W2166924764","https://openalex.org/W2168519318","https://openalex.org/W2169721371","https://openalex.org/W2171112017","https://openalex.org/W4205777466","https://openalex.org/W4232552111","https://openalex.org/W4239975174","https://openalex.org/W4254762831","https://openalex.org/W4300958603","https://openalex.org/W6635272604","https://openalex.org/W6638021444","https://openalex.org/W6638648299","https://openalex.org/W6639864006","https://openalex.org/W6640826072","https://openalex.org/W6650672680","https://openalex.org/W7007777617"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W3005929145","https://openalex.org/W2753240997","https://openalex.org/W32468306","https://openalex.org/W1132158502","https://openalex.org/W575373164","https://openalex.org/W2082871166","https://openalex.org/W2157102353","https://openalex.org/W3144358768","https://openalex.org/W1985295038"],"abstract_inverted_index":{"Bring":[0],"Your":[1],"Own":[2],"Device":[3],"(BYOD)":[4],"is":[5,28,102],"an":[6],"information":[7],"technology":[8],"(IT)":[9],"policy":[10],"that":[11,33,50,83,98],"allows":[12],"employees":[13],"to":[14,20,137],"use":[15],"their":[16],"own":[17],"wireless":[18],"devices":[19],"access":[21],"internal":[22],"network":[23],"at":[24],"work.":[25],"Mobile":[26],"malware":[27],"a":[29,78],"major":[30],"security":[31,48,87],"concern":[32],"impedes":[34],"BYOD's":[35],"further":[36,92],"adoption":[37],"in":[38],"enterprises.":[39],"Existing":[40],"works":[41],"identify":[42],"the":[43,53,59,70,96,114,122,135,139,144,149],"need":[44],"for":[45],"better":[46],"BYOD":[47,86,100],"mechanisms":[49,57],"balance":[51],"between":[52],"strength":[54],"of":[55,61,72,125,134,148],"such":[56,63],"and":[58,110,112,146],"costs":[60],"implementing":[62],"mechanisms.":[64],"In":[65],"this":[66],"paper,":[67],"based":[68],"on":[69,118],"idea":[71],"self-reinforced":[73],"feedback":[74,140],"loop,":[75],"we":[76],"propose":[77],"periodic":[79],"smartphone":[80,101],"sampling":[81,116,152],"mechanism":[82,136],"significantly":[84],"improve":[85],"mechanism's":[88],"effectiveness":[89,147],"without":[90],"incurring":[91],"costs.":[93],"We":[94,142],"quantify":[95],"likelihood":[97],"\u201ca":[99],"infected":[103],"by":[104,106,156],"malware\u201d":[105],"two":[107,120],"metrics,":[108],"vulnerability":[109],"uncertainty,":[111],"base":[113],"iterative":[115],"process":[117],"these":[119,126],"metrics;":[121],"updated":[123],"values":[124],"metrics":[127],"are":[128],"fed":[129],"back":[130],"into":[131],"future":[132],"rounds":[133],"complete":[138],"loop.":[141],"validate":[143],"efficiency":[145],"proposed":[150],"strategic":[151],"via":[153],"simulations":[154],"driven":[155],"publicly":[157],"available,":[158],"real-world":[159],"collected":[160],"traces.":[161]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
