{"id":"https://openalex.org/W2033247376","doi":"https://doi.org/10.1155/2015/746930","title":"Messaging Attacks on Android: Vulnerabilities and Intrusion Detection","display_name":"Messaging Attacks on Android: Vulnerabilities and Intrusion Detection","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2033247376","doi":"https://doi.org/10.1155/2015/746930","mag":"2033247376"},"language":"en","primary_location":{"id":"doi:10.1155/2015/746930","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2015/746930","pdf_url":"http://downloads.hindawi.com/journals/misy/2015/746930.pdf","source":{"id":"https://openalex.org/S152111507","display_name":"Mobile Information Systems","issn_l":"1574-017X","issn":["1574-017X","1875-905X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Mobile Information Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"http://downloads.hindawi.com/journals/misy/2015/746930.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037510108","display_name":"Khodor Hamandi","orcid":null},"institutions":[{"id":"https://openalex.org/I98635879","display_name":"American University of Beirut","ror":"https://ror.org/04pznsd21","country_code":"LB","type":"education","lineage":["https://openalex.org/I98635879"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Khodor Hamandi","raw_affiliation_strings":["Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon","institution_ids":["https://openalex.org/I98635879"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089155641","display_name":"Alaa Salman","orcid":"https://orcid.org/0000-0002-0304-2295"},"institutions":[{"id":"https://openalex.org/I98635879","display_name":"American University of Beirut","ror":"https://ror.org/04pznsd21","country_code":"LB","type":"education","lineage":["https://openalex.org/I98635879"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Alaa Salman","raw_affiliation_strings":["Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon","institution_ids":["https://openalex.org/I98635879"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061146388","display_name":"Imad H. Elhajj","orcid":"https://orcid.org/0000-0002-6461-4699"},"institutions":[{"id":"https://openalex.org/I98635879","display_name":"American University of Beirut","ror":"https://ror.org/04pznsd21","country_code":"LB","type":"education","lineage":["https://openalex.org/I98635879"]}],"countries":["LB"],"is_corresponding":true,"raw_author_name":"Imad H. Elhajj","raw_affiliation_strings":["Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon","institution_ids":["https://openalex.org/I98635879"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060737319","display_name":"Ali Chehab","orcid":"https://orcid.org/0000-0002-1939-2740"},"institutions":[{"id":"https://openalex.org/I98635879","display_name":"American University of Beirut","ror":"https://ror.org/04pznsd21","country_code":"LB","type":"education","lineage":["https://openalex.org/I98635879"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Ali Chehab","raw_affiliation_strings":["Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon","institution_ids":["https://openalex.org/I98635879"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074578100","display_name":"Ayman Kayssi","orcid":"https://orcid.org/0000-0002-0569-1395"},"institutions":[{"id":"https://openalex.org/I98635879","display_name":"American University of Beirut","ror":"https://ror.org/04pznsd21","country_code":"LB","type":"education","lineage":["https://openalex.org/I98635879"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Ayman Kayssi","raw_affiliation_strings":["Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon","institution_ids":["https://openalex.org/I98635879"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5061146388"],"corresponding_institution_ids":["https://openalex.org/I98635879"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.2872,"has_fulltext":true,"cited_by_count":10,"citation_normalized_percentile":{"value":0.54906419,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2015","issue":null,"first_page":"1","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8806051015853882},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6497238278388977},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6485769748687744},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.4705372750759125},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.46582505106925964},{"id":"https://openalex.org/keywords/android-application","display_name":"Android application","score":0.4619380235671997},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.44217774271965027},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2355046272277832}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8806051015853882},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6497238278388977},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6485769748687744},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.4705372750759125},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.46582505106925964},{"id":"https://openalex.org/C3017891749","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android application","level":3,"score":0.4619380235671997},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.44217774271965027},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2355046272277832},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2015/746930","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2015/746930","pdf_url":"http://downloads.hindawi.com/journals/misy/2015/746930.pdf","source":{"id":"https://openalex.org/S152111507","display_name":"Mobile Information Systems","issn_l":"1574-017X","issn":["1574-017X","1875-905X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Mobile Information Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:8ac1bdab2fad4e3698792f974e4cbb78","is_oa":true,"landing_page_url":"https://doaj.org/article/8ac1bdab2fad4e3698792f974e4cbb78","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Mobile Information Systems, Vol 2015 (2015)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2015/746930","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2015/746930","pdf_url":"http://downloads.hindawi.com/journals/misy/2015/746930.pdf","source":{"id":"https://openalex.org/S152111507","display_name":"Mobile Information Systems","issn_l":"1574-017X","issn":["1574-017X","1875-905X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Mobile Information Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2033247376.pdf","grobid_xml":"https://content.openalex.org/works/W2033247376.grobid-xml"},"referenced_works_count":15,"referenced_works":["https://openalex.org/W87210284","https://openalex.org/W162487990","https://openalex.org/W1596254026","https://openalex.org/W1808547240","https://openalex.org/W1963971515","https://openalex.org/W1968526084","https://openalex.org/W1968597682","https://openalex.org/W2016258134","https://openalex.org/W2033811191","https://openalex.org/W2045020147","https://openalex.org/W2125011234","https://openalex.org/W2142145056","https://openalex.org/W2151461670","https://openalex.org/W2153497135","https://openalex.org/W2170125317"],"related_works":["https://openalex.org/W2133389611","https://openalex.org/W327645657","https://openalex.org/W4229710179","https://openalex.org/W4298063370","https://openalex.org/W2965382761","https://openalex.org/W4299620683","https://openalex.org/W3092209205","https://openalex.org/W2464350861","https://openalex.org/W4253505977","https://openalex.org/W2235122986"],"abstract_inverted_index":{"Currently,":[0],"Android":[1,17,27,49,65,79],"is":[2,53],"the":[3,14,23,26,44,48,58,68,78,90],"leading":[4],"mobile":[5],"operating":[6],"system":[7,96],"in":[8,64],"number":[9],"of":[10,25,47,60,70,92,111],"users":[11],"worldwide.":[12],"On":[13],"security":[15,63],"side,":[16],"has":[18],"had":[19],"significant":[20],"challenges":[21],"despite":[22],"efforts":[24],"designers":[28],"to":[29,100],"provide":[30],"a":[31,108],"secure":[32],"environment":[33],"for":[34,84],"apps.":[35],"In":[36],"this":[37],"paper,":[38],"we":[39,74,88],"present":[40,89],"numerous":[41],"attacks":[42],"targeting":[43],"messaging":[45,103],"framework":[46],"system.":[50],"Our":[51,105],"focus":[52],"on":[54,77],"SMS,":[55],"USSD,":[56],"and":[57,66],"evolution":[59],"their":[61],"associated":[62],"accordingly":[67],"development":[69],"related":[71],"attacks.":[72,86,104],"Also,":[73],"shed":[75],"light":[76],"elements":[80],"that":[81,98],"are":[82],"responsible":[83],"these":[85],"Furthermore,":[87],"architecture":[91],"an":[93],"intrusion":[94],"detection":[95,109],"(IDS)":[97],"promises":[99],"thwart":[101],"SMS":[102],"IDS":[106],"shows":[107],"rate":[110],"87.50%":[112],"with":[113],"zero":[114],"false":[115],"positives.":[116]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
