{"id":"https://openalex.org/W2052312267","doi":"https://doi.org/10.1109/ntms.2012.6208692","title":"Towards Smart Anti-Malwares for Battery-Powered Devices","display_name":"Towards Smart Anti-Malwares for Battery-Powered Devices","publication_year":2012,"publication_date":"2012-05-01","ids":{"openalex":"https://openalex.org/W2052312267","doi":"https://doi.org/10.1109/ntms.2012.6208692","mag":"2052312267"},"language":"en","primary_location":{"id":"doi:10.1109/ntms.2012.6208692","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ntms.2012.6208692","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 5th International Conference on New Technologies, Mobility and Security (NTMS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061084335","display_name":"Hajer Al Housani","orcid":null},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Hajer Al Housani","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Khalifa University of Science, \uc2a0Technology and Research\uc2a0, Abu Dhabi, UAE","Dept. of Electr. & Comput. Eng., Khalifa Univ. of Sci., Abu Dhabi, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Khalifa University of Science, \uc2a0Technology and Research\uc2a0, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I176601375"]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng., Khalifa Univ. of Sci., Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I176601375"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049846737","display_name":"Hadi Otrok","orcid":"https://orcid.org/0000-0002-9574-5384"},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Hadi Otrok","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Khalifa University of Science, \uc2a0Technology and Research\uc2a0, Abu Dhabi, UAE","Dept. of Electr. & Comput. Eng., Khalifa Univ. of Sci., Abu Dhabi, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Khalifa University of Science, \uc2a0Technology and Research\uc2a0, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I176601375"]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng., Khalifa Univ. of Sci., Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I176601375"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037837666","display_name":"Rabeb Mizouni","orcid":"https://orcid.org/0000-0001-6915-3759"},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Rabeb Mizouni","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Khalifa University of Science, \uc2a0Technology and Research\uc2a0, Abu Dhabi, UAE","Dept. of Electr. & Comput. Eng., Khalifa Univ. of Sci., Abu Dhabi, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Khalifa University of Science, \uc2a0Technology and Research\uc2a0, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I176601375"]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng., Khalifa Univ. of Sci., Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I176601375"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009285242","display_name":"Jean\u2010Marc Robert","orcid":"https://orcid.org/0000-0002-9495-8038"},"institutions":[{"id":"https://openalex.org/I9736820","display_name":"\u00c9cole de Technologie Sup\u00e9rieure","ror":"https://ror.org/0020snb74","country_code":"CA","type":"education","lineage":["https://openalex.org/I49663120","https://openalex.org/I9736820"]},{"id":"https://openalex.org/I29607241","display_name":"\u00c9cole Normale Sup\u00e9rieure - PSL","ror":"https://ror.org/05a0dhs15","country_code":"FR","type":"funder","lineage":["https://openalex.org/I2746051580","https://openalex.org/I29607241"]}],"countries":["CA","FR"],"is_corresponding":false,"raw_author_name":"Jean-Marc Robert","raw_affiliation_strings":["D\u00e9partement de g\u00e9nie logiciel et des TI, Ecole de technologie sup\u00e9rieure, Montreal, QUE, Canada","Dept. de Genie Logiciel et des TI, Ecole de Technol. Super., Montreal, QC, Canada"],"affiliations":[{"raw_affiliation_string":"D\u00e9partement de g\u00e9nie logiciel et des TI, Ecole de technologie sup\u00e9rieure, Montreal, QUE, Canada","institution_ids":["https://openalex.org/I9736820"]},{"raw_affiliation_string":"Dept. de Genie Logiciel et des TI, Ecole de Technol. Super., Montreal, QC, Canada","institution_ids":["https://openalex.org/I29607241"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005269467","display_name":"Azzam Mourad","orcid":"https://orcid.org/0000-0001-9434-5322"},"institutions":[{"id":"https://openalex.org/I56306041","display_name":"Lebanese American University","ror":"https://ror.org/00hqkan37","country_code":"LB","type":"education","lineage":["https://openalex.org/I56306041"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Azzam Mourad","raw_affiliation_strings":["Department of Computer Science and Mathematics, Lebanese American University, Beirut, Lebanon","Dept. of Comput. Sci. & Math., Lebanese American Univ., Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Mathematics, Lebanese American University, Beirut, Lebanon","institution_ids":["https://openalex.org/I56306041"]},{"raw_affiliation_string":"Dept. of Comput. Sci. & Math., Lebanese American Univ., Beirut, Lebanon","institution_ids":["https://openalex.org/I56306041"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5061084335"],"corresponding_institution_ids":["https://openalex.org/I176601375"],"apc_list":null,"apc_paid":null,"fwci":0.7092,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.72578454,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"4","issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.7213383316993713},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7133740782737732},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6673581600189209},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6524131298065186},{"id":"https://openalex.org/keywords/battery","display_name":"Battery (electricity)","score":0.6512132287025452},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.5068710446357727},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.24167722463607788},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08155950903892517}],"concepts":[{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.7213383316993713},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7133740782737732},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6673581600189209},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6524131298065186},{"id":"https://openalex.org/C555008776","wikidata":"https://www.wikidata.org/wiki/Q267298","display_name":"Battery (electricity)","level":3,"score":0.6512132287025452},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.5068710446357727},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.24167722463607788},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08155950903892517},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ntms.2012.6208692","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ntms.2012.6208692","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 5th International Conference on New Technologies, Mobility and Security (NTMS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.5199999809265137,"id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1594396784","https://openalex.org/W1964972187","https://openalex.org/W1985746537","https://openalex.org/W2007087405","https://openalex.org/W2030873663","https://openalex.org/W2063439127","https://openalex.org/W2076786893","https://openalex.org/W2079456589","https://openalex.org/W2120900307","https://openalex.org/W2142889610","https://openalex.org/W2156449948","https://openalex.org/W2166924764","https://openalex.org/W4213336744"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W3152891574","https://openalex.org/W2249809453","https://openalex.org/W4316881845"],"abstract_inverted_index":{"Anti-malware":[0],"programs":[1],"(AM)":[2],"are":[3,15,72,95],"well-known":[4],"powerful":[5],"security":[6,33,117,134],"tools":[7],"that":[8,129],"protects":[9],"against":[10],"malicious":[11],"activities.":[12],"Behaviour-based":[13],"AMs":[14],"seen":[16],"as":[17,75],"suitable":[18],"candidates":[19],"to":[20,98,101,106,137],"detect":[21],"unknown":[22],"malwares":[23],"in":[24,46,60,79],"mobile":[25],"devices.":[26,90],"Usually,":[27],"AM":[28],"offers":[29,42,57],"different":[30,133],"levels":[31,105,135],"of":[32,48,51,62,65,88,145],"namely":[34],"high,":[35],"medium,":[36],"and":[37,111,141],"low.":[38],"The":[39],"low":[40,49],"level":[41,56,82,118],"minimal":[43],"basic":[44],"checks":[45,59],"case":[47],"probability":[50,64],"attacks":[52],"while":[53],"the":[54,86,116,138,142,146],"high":[55,63,80],"intensive":[58],"situations":[61],"attacks.":[66],"Despite":[67],"their":[68],"efficiency,":[69],"behaviour-based":[70],"anti-malwares":[71,94],"still":[73],"considered":[74],"resource":[76],"consumer":[77],"especially":[78],"detection":[81],"which":[83],"reduces":[84],"considerably":[85],"lifetime":[87],"handheld":[89],"In":[91],"addition,":[92],"current":[93],"not":[96],"smart":[97,127],"decide":[99],"when":[100],"shift":[102,131],"across":[103],"those":[104],"reduce":[107],"both":[108],"resources":[109],"consumption":[110],"false":[112],"alarms":[113],"without":[114],"scarifying":[115],"required.":[119],"To":[120],"alleviate":[121],"this":[122],"problem,":[123],"we":[124],"propose":[125],"a":[126,155],"anti-malware":[128],"can":[130],"between":[132],"according":[136],"assets":[139],"value":[140],"battery":[143],"status":[144],"resource-constrained":[147],"device.":[148],"Such":[149],"decision":[150],"is":[151],"made":[152],"possible":[153],"using":[154],"nonzero-sum":[156],"non-cooperative":[157],"game":[158],"theoretical":[159],"model.":[160]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
