{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T18:35:14Z","timestamp":1725993314509},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030009151"},{"type":"electronic","value":"9783030009168"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00916-8_52","type":"book-chapter","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T03:45:33Z","timestamp":1537847133000},"page":"567-577","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Android App Classification and Permission Usage Risk Assessment"],"prefix":"10.1007","author":[{"given":"Yidong","family":"Shen","sequence":"first","affiliation":[]},{"given":"Ming","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Wenjing","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Yiming","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Tong","family":"Qiao","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"key":"52_CR1","unstructured":"Androgurad. https:\/\/github.com\/androguard"},{"key":"52_CR2","unstructured":"Beautifulsoup. https:\/\/pypi.python.org\/pypi\/beautifulsoup4"},{"key":"52_CR3","unstructured":"Virustotal. https:\/\/www.virustotal.com\/zh-cn\/"},{"key":"52_CR4","doi-asserted-by":"crossref","unstructured":"Allix, K., Bissyand\u00e9, T.F., Klein, J., Le Traon, Y.: AndroZoo: collecting millions of android apps for the research community. In: 2016 IEEE\/ACM 13th Working Conference on Mining Software Repositories (MSR), pp. 468\u2013471. IEEE (2016)","DOI":"10.1145\/2901739.2903508"},{"key":"52_CR5","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., Siemens, C.: DREBIN: effective and explainable detection of android malware in your pocket. In: NDSS (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"52_CR6","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, p. 3. ACM (2012)","DOI":"10.1145\/2335356.2335360"},{"key":"52_CR7","unstructured":"Google: Android system permission 2015 (2015). https:\/\/developer.android.com\/guide\/topics\/permissions\/index.html"},{"key":"52_CR8","doi-asserted-by":"crossref","unstructured":"Ho, T.K.: Random decision forests. In: Proceedings of the Third International Conference on Document Analysis and Recognition, vol. 1, pp. 278\u2013282. IEEE (1995)","DOI":"10.1109\/ICDAR.1995.598994"},{"issue":"4","key":"52_CR9","first-page":"459","volume":"22","author":"AK Jha","year":"2016","unstructured":"Jha, A.K., Lee, W.J.: Analysis of permission-based security in android through policy expert, developer, and end user perspectives. J. UCS 22(4), 459\u2013474 (2016)","journal-title":"J. UCS"},{"key":"52_CR10","unstructured":"McAfee: Mcafee labs threats report April 2017 (2017). https:\/\/www.mcafee.com\/us\/resources\/reports\/rp-quarterly-threats-mar-2017.pdf"},{"key":"52_CR11","doi-asserted-by":"crossref","unstructured":"Oglaza, A., Laborde, R., Benzekri, A., Barr\u00e8re, F.: A recommender-based system for assisting non-technical users in managing android permissions. In: 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 1\u20139. IEEE (2016)","DOI":"10.1109\/ARES.2016.54"},{"key":"52_CR12","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.cose.2016.11.006","volume":"65","author":"B Rashidi","year":"2017","unstructured":"Rashidi, B., Fung, C., Bertino, E.: Android resource usage risk assessment using hidden Markov model and online learning. Comput. Secur. 65, 90\u2013107 (2017)","journal-title":"Comput. Secur."},{"key":"52_CR13","doi-asserted-by":"crossref","unstructured":"Rashidi, B., Fung, C., Vu, T.: Dude, ask the experts!: Android resource access permission recommendation with recdroid. In: IFIP\/IEEE International Symposium on Integrated Network Management, pp. 296\u2013304. IEEE (2015)","DOI":"10.1109\/INM.2015.7140304"},{"key":"52_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/978-3-319-45744-4_24","volume-title":"Computer Security \u2013 ESORICS 2016, Part I","author":"B Rashidi","year":"2016","unstructured":"Rashidi, B., Fung, C., Nguyen, A., Vu, T.: Android permission recommendation using transitive Bayesian inference model. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016, Part I. LNCS, vol. 9878, pp. 477\u2013497. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45744-4_24"},{"key":"52_CR15","doi-asserted-by":"crossref","unstructured":"Sarma, B.P., Li, N., Gates, C., Potharaju, R., Nita-Rotaru, C., Molloy, I.: Android permissions: a perspective combining risks and benefits. In: Proceedings of the 17th ACM symposium on Access Control Models and Technologies, pp. 13\u201322. ACM (2012)","DOI":"10.1145\/2295136.2295141"},{"key":"52_CR16","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.dss.2016.09.006","volume":"93","author":"K Sokolova","year":"2017","unstructured":"Sokolova, K., Perez, C., Lemercier, M.: Android application classification and anomaly detection with graph-based permission patterns. Decis. Support. Syst. 93, 62\u201376 (2017)","journal-title":"Decis. Support. Syst."},{"key":"52_CR17","doi-asserted-by":"crossref","unstructured":"Taylor, V.F., Martinovic, I.: Starving permission-hungry android apps using SecuRank. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1850\u20131852. ACM (2016)","DOI":"10.1145\/2994459.2994474"},{"key":"52_CR18","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: IEEE Symposium on Security and Privacy, pp. 95\u2013109 (2012)","DOI":"10.1109\/SP.2012.16"},{"key":"52_CR19","doi-asserted-by":"crossref","unstructured":"Zhu, H., Xiong, H., Ge, Y., Chen, E.: Mobile app recommendations with security and privacy awareness. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 951\u2013960. ACM (2014)","DOI":"10.1145\/2623330.2623705"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Collaborative Computing: Networking, Applications and Worksharing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00916-8_52","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T16:19:44Z","timestamp":1571933984000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00916-8_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030009151","9783030009168"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00916-8_52","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"CollaborateCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Collaborative Computing: Networking, Applications and Worksharing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Edinburgh","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"colcom2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/collaboratecom.eai-conferences.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}