{"id":"https://openalex.org/W4230625568","doi":"https://doi.org/10.1145/2801694.2801707","title":"AntMonitor","display_name":"AntMonitor","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W4230625568","doi":"https://doi.org/10.1145/2801694.2801707"},"language":"en","primary_location":{"id":"doi:10.1145/2801694.2801707","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2801694.2801707","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2015 Workshop on Wireless of the Students, by the Students, &amp; for the Students - S3 '15","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016503293","display_name":"Anastasia Shuba","orcid":null},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Anastasia Shuba","raw_affiliation_strings":["CalIT2 & UC Irvine, Irvine, CA, USA"],"affiliations":[{"raw_affiliation_string":"CalIT2 & UC Irvine, Irvine, CA, USA","institution_ids":["https://openalex.org/I204250578"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103284663","display_name":"Anh Le","orcid":"https://orcid.org/0000-0003-0514-8840"},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anh Le","raw_affiliation_strings":["CalIT2 & UC Irvine, Irvine, CA, USA"],"affiliations":[{"raw_affiliation_string":"CalIT2 & UC Irvine, Irvine, CA, USA","institution_ids":["https://openalex.org/I204250578"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091119313","display_name":"Minas Gjoka","orcid":null},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Minas Gjoka","raw_affiliation_strings":["CalIT2 & UC Irvine, Irvine, CA, USA"],"affiliations":[{"raw_affiliation_string":"CalIT2 & UC Irvine, Irvine, CA, USA","institution_ids":["https://openalex.org/I204250578"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033577838","display_name":"Janus Varmarken","orcid":null},"institutions":[{"id":"https://openalex.org/I83467386","display_name":"IT University of Copenhagen","ror":"https://ror.org/02309jg23","country_code":"DK","type":"education","lineage":["https://openalex.org/I83467386"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Janus Varmarken","raw_affiliation_strings":["IT Univ. of Copenhagen, Copenhagen, Denmark"],"affiliations":[{"raw_affiliation_string":"IT Univ. of Copenhagen, Copenhagen, Denmark","institution_ids":["https://openalex.org/I83467386"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017911522","display_name":"Simon Langhoff","orcid":null},"institutions":[{"id":"https://openalex.org/I83467386","display_name":"IT University of Copenhagen","ror":"https://ror.org/02309jg23","country_code":"DK","type":"education","lineage":["https://openalex.org/I83467386"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Simon Langhoff","raw_affiliation_strings":["IT Univ. of Copenhagen, Copenhagen, Denmark"],"affiliations":[{"raw_affiliation_string":"IT Univ. of Copenhagen, Copenhagen, Denmark","institution_ids":["https://openalex.org/I83467386"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013543313","display_name":"Athina Markopoulou","orcid":"https://orcid.org/0000-0003-1803-8675"},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Athina Markopoulou","raw_affiliation_strings":["CalIT2 & UC Irvine, Irvine, CA, USA"],"affiliations":[{"raw_affiliation_string":"CalIT2 & UC Irvine, Irvine, CA, USA","institution_ids":["https://openalex.org/I204250578"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5016503293"],"corresponding_institution_ids":["https://openalex.org/I204250578"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.24414086,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"25","last_page":"27"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7952886819839478},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.5960492491722107},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5576404333114624},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.5197998285293579},{"id":"https://openalex.org/keywords/mobile-phone","display_name":"Mobile phone","score":0.43832215666770935},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.42806389927864075},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39450573921203613},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.36890581250190735},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3109421730041504},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.19158205389976501},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.17066127061843872}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7952886819839478},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.5960492491722107},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5576404333114624},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.5197998285293579},{"id":"https://openalex.org/C2777421447","wikidata":"https://www.wikidata.org/wiki/Q17517","display_name":"Mobile phone","level":2,"score":0.43832215666770935},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.42806389927864075},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39450573921203613},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.36890581250190735},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3109421730041504},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.19158205389976501},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.17066127061843872},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2801694.2801707","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2801694.2801707","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2015 Workshop on Wireless of the Students, by the Students, &amp; for the Students - S3 '15","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W124941384","https://openalex.org/W1983750266","https://openalex.org/W1997218415","https://openalex.org/W2003063963","https://openalex.org/W2060692877","https://openalex.org/W2067481044","https://openalex.org/W2096474000","https://openalex.org/W2099464953","https://openalex.org/W2124059098","https://openalex.org/W2134684274","https://openalex.org/W2164539435","https://openalex.org/W2292723020"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390777183","https://openalex.org/W1882848237","https://openalex.org/W4252772812","https://openalex.org/W2130966263","https://openalex.org/W2316776327","https://openalex.org/W2328387788","https://openalex.org/W2911510094","https://openalex.org/W4247174507","https://openalex.org/W2502631634"],"abstract_inverted_index":{"Mobile":[0],"devices":[1,34],"play":[2],"an":[3,13,118],"essential":[4],"role":[5],"in":[6,16,69,87],"the":[7,27,30,54],"Internet":[8],"today,":[9],"and":[10,39,77,80,105,123,147,149,200],"there":[11,40],"is":[12,41],"increasing":[14],"interest":[15],"using":[17,121],"them":[18],"as":[19,117],"a":[20,42,70,95,129,134],"vantage":[21],"point":[22],"for":[23,98,120,126,144],"network":[24,67,99],"measurement":[25],"from":[26,156,166,189],"edge.":[28],"At":[29],"same":[31],"time,":[32],"these":[33],"store":[35],"personal,":[36],"sensitive":[37],"information,":[38],"growing":[43],"number":[44],"of":[45,57,64,82,84,136,153],"applications":[46],"that":[47,60,72,162,182],"leak":[48],"it.":[49],"We":[50],"propose":[51],"AntMonitor":[52,94,122,167,183],"--":[53],"first":[55,91],"system":[56],"its":[58],"kind":[59],"supports":[61],"(i)":[62],"collection":[63],"large-scale,":[65],"semantic-rich":[66],"traffic":[68],"way":[71],"respects":[73],"users'":[74],"privacy":[75],"preferences":[76],"(ii)":[78],"detection":[79],"prevention":[81],"leakage":[83],"private":[85,191],"information":[86,192],"real":[88],"time.":[89],"The":[90,112],"property":[92,114],"makes":[93],"powerful":[96],"tool":[97],"researchers":[100],"who":[101],"want":[102],"to":[103,140],"collect":[104],"analyze":[106],"large-scale":[107],"yet":[108],"fine-grained":[109,163],"mobile":[110,154],"measurements.":[111],"second":[113],"can":[115],"work":[116],"incentive":[119],"contributing":[124],"data":[125,155,164],"analysis.":[127],"As":[128],"proof-of-concept,":[130],"we":[131,180],"have":[132],"developed":[133],"prototype":[135],"AntMonitor,":[137],"deployed":[138],"it":[139],"monitor":[141],"9":[142],"users":[143],"2":[145],"months,":[146],"collected":[148,165],"analyzed":[150],"20":[151],"GB":[152],"151":[157],"applications.":[158],"Preliminary":[159],"results":[160],"show":[161],"could":[168,184],"enable":[169],"application":[170],"classification":[171],"with":[172],"higher":[173],"accuracy":[174],"than":[175],"state-of-the-art":[176],"approaches.":[177],"In":[178],"addition,":[179],"demonstrated":[181],"help":[185],"prevent":[186],"several":[187],"apps":[188],"leaking":[190],"over":[193],"unencrypted":[194],"traffic,":[195],"including":[196],"phone":[197],"numbers,":[198],"emails,":[199],"device":[201],"identifiers.":[202]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-05-11T00:00:00"}
