{"id":"https://openalex.org/W2111509059","doi":"https://doi.org/10.1145/2386995.2387016","title":"Android SMS botnet","display_name":"Android SMS botnet","publication_year":2012,"publication_date":"2012-10-24","ids":{"openalex":"https://openalex.org/W2111509059","doi":"https://doi.org/10.1145/2386995.2387016","mag":"2111509059"},"language":"en","primary_location":{"id":"doi:10.1145/2386995.2387016","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2386995.2387016","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th ACM international symposium on Mobility management and wireless access","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037510108","display_name":"Khodor Hamandi","orcid":null},"institutions":[{"id":"https://openalex.org/I98635879","display_name":"American University of Beirut","ror":"https://ror.org/04pznsd21","country_code":"LB","type":"education","lineage":["https://openalex.org/I98635879"]}],"countries":["LB"],"is_corresponding":true,"raw_author_name":"Khodor Hamandi","raw_affiliation_strings":["American University of Beirut, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"American University of Beirut, Beirut, Lebanon","institution_ids":["https://openalex.org/I98635879"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061146388","display_name":"Imad H. Elhajj","orcid":"https://orcid.org/0000-0002-6461-4699"},"institutions":[{"id":"https://openalex.org/I98635879","display_name":"American University of Beirut","ror":"https://ror.org/04pznsd21","country_code":"LB","type":"education","lineage":["https://openalex.org/I98635879"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Imad H. Elhajj","raw_affiliation_strings":["American University of Beirut, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"American University of Beirut, Beirut, Lebanon","institution_ids":["https://openalex.org/I98635879"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060737319","display_name":"Ali Chehab","orcid":"https://orcid.org/0000-0002-1939-2740"},"institutions":[{"id":"https://openalex.org/I98635879","display_name":"American University of Beirut","ror":"https://ror.org/04pznsd21","country_code":"LB","type":"education","lineage":["https://openalex.org/I98635879"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Ali Chehab","raw_affiliation_strings":["American University of Beirut, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"American University of Beirut, Beirut, Lebanon","institution_ids":["https://openalex.org/I98635879"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074578100","display_name":"Ayman Kayssi","orcid":"https://orcid.org/0000-0002-0569-1395"},"institutions":[{"id":"https://openalex.org/I98635879","display_name":"American University of Beirut","ror":"https://ror.org/04pznsd21","country_code":"LB","type":"education","lineage":["https://openalex.org/I98635879"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Ayman Kayssi","raw_affiliation_strings":["American University of Beirut, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"American University of Beirut, Beirut, Lebanon","institution_ids":["https://openalex.org/I98635879"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5037510108"],"corresponding_institution_ids":["https://openalex.org/I98635879"],"apc_list":null,"apc_paid":null,"fwci":1.2242,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.83279763,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"125","last_page":"130"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.9447157382965088},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8344972729682922},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6751989126205444},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5826895236968994},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.48888248205184937},{"id":"https://openalex.org/keywords/spamming","display_name":"Spamming","score":0.4219130277633667},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3687843680381775},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2668689787387848},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2346341907978058},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.17684906721115112}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.9447157382965088},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8344972729682922},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6751989126205444},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5826895236968994},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.48888248205184937},{"id":"https://openalex.org/C158955206","wikidata":"https://www.wikidata.org/wiki/Q83058","display_name":"Spamming","level":3,"score":0.4219130277633667},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3687843680381775},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2668689787387848},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2346341907978058},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.17684906721115112}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2386995.2387016","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2386995.2387016","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th ACM international symposium on Mobility management and wireless access","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.8100000023841858}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2021926456","https://openalex.org/W2033811191","https://openalex.org/W2098563793","https://openalex.org/W2153497135","https://openalex.org/W2238764994"],"related_works":["https://openalex.org/W2124355208","https://openalex.org/W4307740390","https://openalex.org/W4205869786","https://openalex.org/W2176994834","https://openalex.org/W4205698284","https://openalex.org/W1481472066","https://openalex.org/W3005900565","https://openalex.org/W81326293","https://openalex.org/W1550514379","https://openalex.org/W2407938215"],"abstract_inverted_index":{"In":[0,82],"this":[1,66,83,120],"paper,":[2],"we":[3,19,85],"present":[4],"an":[5],"SMS-based":[6],"Android":[7,93],"botnet.":[8,116],"Since":[9],"all":[10],"mobile":[11],"phones":[12],"have":[13,127],"SMS":[14,22,49,132,135],"services":[15],"as":[16,23,46],"a":[17,47,105,128],"feature,":[18],"will":[20],"use":[21],"the":[24,34,38,54,70,73,92,100,110,115,123],"medium":[25,74],"of":[26,28,88,91,104,114],"propagation":[27],"Command":[29,78],"and":[30,37,52,72,79,102,122,137],"Control":[31,80],"messages":[32],"between":[33],"botnet":[35,125],"controller":[36],"victim":[39],"devices.":[40],"The":[41],"malicious":[42,106],"application":[43,51,107,121],"presents":[44],"itself":[45],"regular":[48],"messaging":[50],"uses":[53],"basic":[55,111],"permissions":[56],"needed":[57],"to":[58,76],"send/receive":[59],"short":[60],"messages.":[61,81],"Previous":[62],"work":[63],"done":[64],"in":[65],"area":[67],"focused":[68],"on":[69,131],"topology":[71],"used":[75],"exchange":[77],"work,":[84],"take":[86],"advantage":[87],"several":[89],"features":[90],"operating":[94],"system":[95],"that":[96,108],"would":[97],"allow":[98],"for":[99],"development":[101],"deployment":[103],"constitutes":[109],"building":[112],"block":[113],"We":[117],"demonstrate":[118],"how":[119],"associated":[124],"can":[126],"drastic":[129],"impact":[130],"voting,":[133],"Premium":[134],"services,":[136],"credit":[138],"transfer.":[139]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
