{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T10:40:02Z","timestamp":1768732802704,"version":"3.49.0"},"reference-count":81,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,6,12]],"date-time":"2021-06-12T00:00:00Z","timestamp":1623456000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,12]],"date-time":"2021-06-12T00:00:00Z","timestamp":1623456000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s10664-021-09974-4","type":"journal-article","created":{"date-parts":[[2021,6,12]],"date-time":"2021-06-12T15:02:47Z","timestamp":1623510167000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Beyond the virus: a first look at coronavirus-themed Android malware"],"prefix":"10.1007","volume":"26","author":[{"given":"Liu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Ren","family":"He","sequence":"additional","affiliation":[]},{"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Pengcheng","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Yuanchun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yajin","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Yulei","family":"Sui","sequence":"additional","affiliation":[]},{"given":"Yao","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Guoai","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,12]]},"reference":[{"key":"9974_CR1","unstructured":"AlienVault (2020) https:\/\/otx.alienvault.com\/"},{"key":"9974_CR2","unstructured":"APKiD (2020) https:\/\/github.com\/rednaga\/APKiD"},{"key":"9974_CR3","unstructured":"ApkProtect (2020) https:\/\/apkprotect.baidu.com\/"},{"key":"9974_CR4","unstructured":"Apkpure (2020) https:\/\/apkpure.com"},{"key":"9974_CR5","unstructured":"AppChina (2020) http:\/\/www.appchina.com"},{"key":"9974_CR6","doi-asserted-by":"crossref","unstructured":"Arp D, Spreitzenbarth M, Hubner M, Gascon H, Rieck K, Siemens C (2014) Drebin: effective and explainable detection of android malware in your pocket. In: Ndss, vol 14, pp 23\u201326","DOI":"10.14722\/ndss.2014.23247"},{"issue":"6","key":"9974_CR7","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1145\/2666356.2594299","volume":"49","author":"S Arzt","year":"2014","unstructured":"Arzt S, Rasthofer S, Fritz C, Bodden E, Bartel A, Klein J, Le Traon Y, Octeau D, McDaniel P (2014) Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. ACM Sigplan Not 49(6):259\u2013269","journal-title":"ACM Sigplan Not"},{"key":"9974_CR8","unstructured":"Bao L, Li T, Xia X, Zhu K, Li H, Yang X (2020) How does working from home affect developer productivity?\u2014a case study of baidu during covid-19 pandemic"},{"key":"9974_CR9","first-page":"1122","volume":"1","author":"C Butt","year":"2020","unstructured":"Butt C, Gill J, Chun D, Babu BA (2020) Deep learning system to screen coronavirus disease 2019 pneumonia. Appl Intell 1:1122\u20131129","journal-title":"Appl Intell"},{"issue":"5","key":"9974_CR10","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1016\/S1473-3099(20)30235-8","volume":"20","author":"Y Chen","year":"2020","unstructured":"Chen Y, Li L (2020) Sars-cov-2: virus dynamics and host response. Lancet Infect Dis 20(5):515\u2013516","journal-title":"Lancet Infect Dis"},{"key":"9974_CR11","unstructured":"Computer and Mobile Based Social Engineering (2020) https:\/\/www.greycampus.com\/opencampus\/ethical-hacking\/computer-and-mobile-based-social-engineering"},{"issue":"3","key":"9974_CR12","doi-asserted-by":"publisher","first-page":"2000045","DOI":"10.2807\/1560-7917.ES.2020.25.3.2000045","volume":"25","author":"VM Corman","year":"2020","unstructured":"Corman VM, Landt O, Kaiser M, Molenkamp R, Meijer A, Chu DK, Bleicker T, Br\u00fcnink S, Schneider J, Schmidt ML et al (2020) Detection of 2019 novel coronavirus (2019-ncov) by real-time rt-pcr. Eurosurveillance 25(3):2000045","journal-title":"Eurosurveillance"},{"key":"9974_CR13","unstructured":"COVID-19: Cloud Threat Landscape (2020) https:\/\/unit42.paloaltonetworks.com\/covid-19-cloud-threat-landscape\/"},{"key":"9974_CR14","unstructured":"COVID-19 Exploited by Malicious Cyber Actors (2020) https:\/\/www.us-cert.gov\/ncas\/alerts\/aa20-099a"},{"key":"9974_CR15","unstructured":"COVID-19 Goes Mobile: Coronavirus Malicious Applications Discovered (2020) https:\/\/research.checkpoint.com\/2020\/covid-19-goes-mobile-coronavirus-malicious-applications-discovered\/"},{"key":"9974_CR16","unstructured":"COVID-19\u2014Malware Makes Hay During a Pandemic (2020) https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/covid-19-malware-makes-hay-during-a-pandemic\/"},{"key":"9974_CR17","unstructured":"COVID-19-Themed Malware Goes Mobile (2020) https:\/\/www.bankinfosecurity.com\/covid-19-themed-malware-goes-mobile-a-13981"},{"key":"9974_CR18","doi-asserted-by":"crossref","unstructured":"da Mota Silveira Neto PA, Mannan UA, de Almeida ES, Nagappan N, Lo D, Kochhar PS, Gao C, Ahmed I (2020) A deep dive on the impact of covid-19 in software development","DOI":"10.1109\/TSE.2021.3088759"},{"key":"9974_CR19","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1016\/j.neuroimage.2016.06.001","volume":"167","author":"B Davis","year":"2018","unstructured":"Davis B, Hasson U (2018) Predictability of what or where reduces brain activity, but a bottleneck occurs when both are predictable. NeuroImage 167:224\u2013236. https:\/\/doi.org\/10.1016\/j.neuroimage.2016.06.001. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1053811916302014","journal-title":"NeuroImage"},{"key":"9974_CR20","unstructured":"Developing Story: COVID-19 Used in Malicious Campaigns (2020) https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/coronavirus-used-in-spam-malware-file-names-and-malicious-domains"},{"issue":"1","key":"9974_CR21","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1002\/jeab.176","volume":"105","author":"RFL Diamond","year":"2016","unstructured":"Diamond RFL, Stoinski TS, Mickelberg JL, Basile BM, Gazes RP, Templer VL, Hampton RR (2016) Similar stimulus features control visual classification in orangutans and rhesus monkeys. J Exp Anal Behav 105(1):100\u2013110. https:\/\/doi.org\/10.1002\/jeab.176. https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1002\/jeab.176","journal-title":"J Exp Anal Behav"},{"key":"9974_CR22","unstructured":"Fake Netflix Android App is Social Engineering Scam (2020) https:\/\/www.csoonline.com\/article\/2129805\/fake-netflix-android-app-is-social-engineering-scam.html"},{"key":"9974_CR23","doi-asserted-by":"crossref","unstructured":"Farooqi S, Feal \u00c1, Lauinger T, McCoy D, Shafiq Z, Vallina-Rodriguez N (2020) Understanding incentivized mobile app installs on google play store. In: Proceedings of the ACM internet measurement conference","DOI":"10.1145\/3419394.3423662"},{"key":"9974_CR24","doi-asserted-by":"crossref","unstructured":"Feng Y, Anand S, Dillig I, Aiken A (2014) Apposcopy: semantics-based detection of android malware through static analysis. In: Proceedings of the 22nd ACM SIGSOFT international symposium on foundations of software engineering, pp 576\u2013587","DOI":"10.1145\/2635868.2635869"},{"key":"9974_CR25","unstructured":"Findings on COVID-19 and Online Security Threats (2020) https:\/\/www.blog.google\/technology\/safety-security\/threat-analysis-group\/findings-covid-19-and-online-security-threats\/"},{"key":"9974_CR26","doi-asserted-by":"crossref","unstructured":"Ford D, Storey MA, Zimmermann T, Bird C, Jaffe S, Maddila C, Butler JL, Houck B, Nagappan N (2020) A tale of two cities: software developers working from home during the covid-19 pandemic","DOI":"10.1145\/3487567"},{"key":"9974_CR27","unstructured":"Fresh COVID-19 Phishing Scams Try to Spread Malware: Report (2020) https:\/\/www.bankinfosecurity.com\/fresh-covid-19-phishing-scams-try-to-spread-malware-report-a-14131"},{"key":"9974_CR28","doi-asserted-by":"crossref","unstructured":"Gadyatskaya O, Lezza AL, Zhauniarovich Y (2016) Evaluation of resource-based app repackaging detection in android. In: Proceedings of the 21st Nordic conference on secure IT systems, NordSec 2016, pp 135\u2013151","DOI":"10.1007\/978-3-319-47560-8_9"},{"key":"9974_CR29","doi-asserted-by":"publisher","unstructured":"Gennari J, French D (2011) Defining malware families based on analyst insights. In: 2011 IEEE International conference on technologies for homeland security (HST), pp 396\u2013401. https:\/\/doi.org\/10.1109\/THS.2011.6107902","DOI":"10.1109\/THS.2011.6107902"},{"key":"9974_CR30","unstructured":"Google Play (2020) https:\/\/play.google.com"},{"issue":"6","key":"9974_CR31","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.1016\/j.amepre.2016.07.009","volume":"51","author":"QH Grundy","year":"2016","unstructured":"Grundy QH, Wang Z, Bero LA (2016) Challenges in assessing mobile health app quality: a systematic review of prevalent and innovative methods. Am J Prev Med 51(6):1051\u20131059","journal-title":"Am J Prev Med"},{"key":"9974_CR32","doi-asserted-by":"publisher","first-page":"1033","DOI":"10.1109\/TDSC.2019.2908939","volume":"18","author":"Y Hu","year":"2019","unstructured":"Hu Y, Wang H, Zhou Y, Guo Y, Li L, Luo B, Xu F (2019) Dating with scambots: understanding the ecosystem of fraudulent dating applications. IEEE Trans Depend Secure Comput 18:1033\u20131050","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"9974_CR33","doi-asserted-by":"crossref","unstructured":"Hu Y, Wang H, He R, Li L, Tyson G, Castro I, Guo Y, Wu L, Xu G (2020) Mobile app squatting. In: Proceedings of the web conference 2020, pp 1727\u20131738","DOI":"10.1145\/3366423.3380243"},{"key":"9974_CR34","unstructured":"Huawei Market (2020) http:\/\/app.hicloud.com"},{"key":"9974_CR35","doi-asserted-by":"crossref","unstructured":"Ikram M, Vallina-Rodriguez N, Seneviratne S, Kaafar MA, Paxson V (2016) An analysis of the privacy and security risks of android vpn permission-enabled apps. In: Proceedings of the 2016 internet measurement conference, pp 349\u2013364","DOI":"10.1145\/2987443.2987471"},{"issue":"5","key":"9974_CR36","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1016\/j.dsx.2020.05.033","volume":"14","author":"K Iyengar","year":"2020","unstructured":"Iyengar K, Upadhyaya GK, Vaishya R, Jain V (2020) Covid-19 and applications of smartphone technology in the current pandemic. Diabetes Metab Syndr: Clin Res Rev 14(5):733\u2013737. https:\/\/doi.org\/10.1016\/j.dsx.2020.05.033","journal-title":"Diabetes Metab Syndr: Clin Res Rev"},{"key":"9974_CR37","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1089\/cyber.2020.0201","volume":"23","author":"B Kim","year":"2020","unstructured":"Kim B (2020) Effects of social grooming on incivility in covid-19. Cyberpsychol Behav Social Netw 23:519\u2013525","journal-title":"Cyberpsychol Behav Social Netw"},{"key":"9974_CR38","unstructured":"Koodous (2020) https:\/\/koodous.com\/"},{"key":"9974_CR39","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.cose.2013.12.001","volume":"42","author":"T Kwon","year":"2014","unstructured":"Kwon T, Na S (2014) Tinylock: affordable defense against smudge attacks on smartphone pattern lock systems. Comput Secur 42:137\u2013150. https:\/\/doi.org\/10.1016\/j.cose.2013.12.001. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404813001697","journal-title":"Comput Secur"},{"key":"9974_CR40","doi-asserted-by":"crossref","unstructured":"Kywe SM, Li Y, Deng RH, Hong J (2014) Detecting camouflaged applications on mobile application markets. In: International conference on information security and cryptology. Springer, pp 241\u2013254","DOI":"10.1007\/978-3-319-15943-0_15"},{"issue":"6","key":"9974_CR41","doi-asserted-by":"publisher","first-page":"1269","DOI":"10.1109\/TIFS.2017.2656460","volume":"12","author":"L Li","year":"2017","unstructured":"Li L, Li D, Bissyand\u00e9 T F, Klein J, Le Traon Y, Lo D, Cavallaro L (2017a) Understanding android app piggybacking: a systematic study of malicious code grafting. IEEE Trans Inf Forens Secur 12(6):1269\u20131284","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"9974_CR42","doi-asserted-by":"crossref","unstructured":"Li M, Wang W, Wang P, Wang S, Wu D, Liu J, Xue R, Huo W (2017b) Libd: scalable and precise third-party library detection in android markets. In: 2017 IEEE\/ACM 39th international conference on software engineering (ICSE). IEEE, pp 335\u2013346","DOI":"10.1109\/ICSE.2017.38"},{"key":"9974_CR43","unstructured":"Li Y, Yang Z, Guo Y, Chen X (2017c) Droidbot: a lightweight ui-guided test input generator for android. In: 2017 IEEE\/ACM 39th international conference on software engineering companion (ICSE-C). IEEE, pp 23\u201326"},{"key":"9974_CR44","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.bbi.2020.04.020","volume":"87","author":"YH Lin","year":"2020","unstructured":"Lin YH, Liu CH, Chiu YC (2020) Google searches for the keywords of \u201cwash hands\u201d predict the speed of national spread of covid-19 outbreak among 21 countries. Brain Behav Immun 87:30\u201332","journal-title":"Brain Behav Immun"},{"key":"9974_CR45","doi-asserted-by":"crossref","unstructured":"Liu T, Wang H, Li L, Luo X, Dong F, Guo Y, Wang L, Bissyande TF, Klein J (2020) Maddroid: characterising and detecting devious ad content for android apps. In: Proceedings of the Web conference 2020 (WWW\u201920)","DOI":"10.1145\/3366423.3380242"},{"key":"9974_CR46","doi-asserted-by":"crossref","unstructured":"Ma Z, Wang H, Guo Y, Chen X (2016) Libradar: fast and accurate detection of third-party libraries in android apps. In: Proceedings of the 38th international conference on software engineering companion, pp 653\u2013656","DOI":"10.1145\/2889160.2889178"},{"key":"9974_CR47","unstructured":"Malware Classifications (2020) https:\/\/www.kaspersky.com\/resource-center\/threats\/malware-classifications"},{"key":"9974_CR48","unstructured":"Malware Family (2017) https:\/\/www.sciencedirect.com\/topics\/computer-science\/malware-family"},{"key":"9974_CR49","unstructured":"Malware Names (2020) https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/intelligence\/malware-naming"},{"key":"9974_CR50","unstructured":"MyApp Market (2020) https:\/\/android.myapp.com"},{"key":"9974_CR51","unstructured":"MYSTORY (2020) https:\/\/yourstory.com\/mystory\/smartphones-prime-targets-cybercriminals"},{"key":"9974_CR52","unstructured":"New android coronavirus malware threat exposed: here\u2019s what you must not do (2020) https:\/\/www.forbes.com\/sites\/zakdoffman\/2020\/04\/09\/why-android-users-must-now-dodge-this-simple-15-minute-coronavirus-malware-threat\/#6b020abc4c1d"},{"key":"9974_CR53","doi-asserted-by":"publisher","unstructured":"Ralph P, Baltes S, Adisaputri G, Torkar R, Kovalenko V, Kalinowski M, Novielli N, Yoo S, Devroey X, Tan X et al (2020) Pandemic programming. Empir Softw Eng. https:\/\/doi.org\/10.1007\/s10664-020-09875-y","DOI":"10.1007\/s10664-020-09875-y"},{"key":"9974_CR54","doi-asserted-by":"crossref","unstructured":"Rasthofer S, Arzt S, Miltenberger M, Bodden E (2016) Harvesting runtime values in android applications that feature anti-analysis techniques. In: NDSS","DOI":"10.14722\/ndss.2016.23066"},{"key":"9974_CR55","unstructured":"Schild L, Ling C, Blackburn J, Stringhini G, Zhang Y, Zannettou S (2020) \u201cGo eat a bat, chang!\u201d: an early look on the emergence of sinophobic behavior on web communities in the face of covid-19. arXiv:2004.04046"},{"key":"9974_CR56","doi-asserted-by":"crossref","unstructured":"Sebasti\u00e1n M, Rivera R, Kotzias P, Caballero J (2016) Avclass: a tool for massive malware labeling. In: International symposium on research in attacks, intrusions, and defenses. Springer, pp 230\u2013253","DOI":"10.1007\/978-3-319-45719-2_11"},{"key":"9974_CR57","unstructured":"Show evidence that apps for COVID-19 contact-tracing are secure and effective (2020) https:\/\/www.nature.com\/articles\/d41586-020-01264-1"},{"key":"9974_CR58","unstructured":"Social Engineering (2020) https:\/\/www.imperva.com\/learn\/application-security\/social-engineering-attack\/"},{"issue":"e1","key":"9974_CR59","doi-asserted-by":"publisher","first-page":"e28","DOI":"10.1136\/amiajnl-2013-002605","volume":"22","author":"A Sunyaev","year":"2015","unstructured":"Sunyaev A, Dehling T, Taylor PL, Mandl KD (2015) Availability and quality of mobile health app privacy policies. J Am Med Inform Assoc 22 (e1):e28\u2013e33","journal-title":"J Am Med Inform Assoc"},{"key":"9974_CR60","unstructured":"Threat Intelligence Platform (2020) https:\/\/www.esecurityplanet.com\/products\/threat-intelligence-platforms\/"},{"key":"9974_CR61","unstructured":"Top 5 Social Engineering Techniques and How to Prevent Them (2020) https:\/\/www.exabeam.com\/information-security\/social-engineering\/"},{"key":"9974_CR62","unstructured":"Uptodown (2020) https:\/\/en.uptodown.com"},{"key":"9974_CR63","unstructured":"Urlscan (2020) https:\/\/urlscan.io"},{"issue":"1","key":"9974_CR64","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1186\/1472-6947-13-23","volume":"13","author":"L van Velsen","year":"2013","unstructured":"van Velsen L, Beaujean DJ, van Gemert-Pijnen JE (2013) Why mobile health app overload drives us crazy, and how to restore the sanity. BMC Med Inform Decis Making 13(1):23","journal-title":"BMC Med Inform Decis Making"},{"key":"9974_CR65","unstructured":"Vietnamese Threat Actors APT32 Targeting Wuhan Government and Chinese Ministry of Emergency Management in Latest Example of COVID-19 Related Espionage (2020) https:\/\/www.fireeye.com\/blog\/threat-research\/2020\/04\/apt32-targeting-chinese-government-in-covid-19-related-espionage.html"},{"key":"9974_CR66","unstructured":"VirusTotal (2020) https:\/\/www.virustotal.com\/"},{"key":"9974_CR67","doi-asserted-by":"crossref","unstructured":"Wang H, Guo Y, Ma Z, Chen X (2015a) Wukong: a scalable and accurate two-phase approach to android app clone detection. In: Proceedings of the 2015 international symposium on software testing and analysis. ACM, pp 71\u201382","DOI":"10.1145\/2771783.2771795"},{"key":"9974_CR68","doi-asserted-by":"crossref","unstructured":"Wang H, Guo Y, Tang Z, Bai G, Chen X (2015b) Reevaluating android permission gaps with static and dynamic analysis. In: 2015 IEEE Global communications conference (GLOBECOM). IEEE, pp 1\u20136","DOI":"10.1109\/GLOCOM.2015.7417621"},{"key":"9974_CR69","doi-asserted-by":"crossref","unstructured":"Wang H, Hong J, Guo Y (2015c) Using text mining to infer the purpose of permission use in mobile apps. In: Proceedings of the 2015 ACM international joint conference on pervasive and ubiquitous computing, pp 1107\u20131118","DOI":"10.1145\/2750858.2805833"},{"issue":"4","key":"9974_CR70","first-page":"1","volume":"35","author":"H Wang","year":"2017","unstructured":"Wang H, Li Y, Guo Y, Agarwal Y, Hong JI (2017a) Understanding the purpose of permission use in mobile apps. ACM Trans Inf Syst (TOIS) 35 (4):1\u201340","journal-title":"ACM Trans Inf Syst (TOIS)"},{"key":"9974_CR71","doi-asserted-by":"crossref","unstructured":"Wang X, Zhu S, Zhou D, Yang Y (2017b) Droid-antirm: taming control flow anti-analysis to support automated dynamic analysis of android malware. In: Proceedings of the 33rd annual computer security applications conference, pp 350\u2013361","DOI":"10.1145\/3134600.3134601"},{"key":"9974_CR72","doi-asserted-by":"crossref","unstructured":"Wang H, Liu Z, Liang J, Vallina-Rodriguez N, Guo Y, Li L, Tapiador J, Cao J, Xu G (2018) Beyond google play: a large-scale comparative study of chinese android app markets. In: Proceedings of the internet measurement conference 2018, pp 293\u2013307","DOI":"10.1145\/3278532.3278558"},{"key":"9974_CR73","doi-asserted-by":"crossref","unstructured":"Wang H, Li H, Guo Y (2019a) Understanding the evolution of mobile app ecosystems: a longitudinal measurement study of google play. In: The World Wide Web conference, pp 1988\u20131999","DOI":"10.1145\/3308558.3313611"},{"key":"9974_CR74","doi-asserted-by":"crossref","unstructured":"Wang H, Liu H, Xiao X, Meng G, Guo Y (2019b) Characterizing android app signing issues. In: 2019 34th IEEE\/ACM international conference on automated software engineering (ASE). IEEE, pp 280\u2013292","DOI":"10.1109\/ASE.2019.00035"},{"issue":"11","key":"9974_CR75","doi-asserted-by":"publisher","first-page":"1061","DOI":"10.1001\/jama.2020.1585","volume":"323","author":"D Wang","year":"2020","unstructured":"Wang D, Hu B, Hu C, Zhu F, Liu X, Zhang J, Wang B, Xiang H, Cheng Z, Xiong Y et al (2020a) Clinical characteristics of 138 hospitalized patients with 2019 novel coronavirus\u2013infected pneumonia in Wuhan, China. JAMA 323(11):1061\u20131069","journal-title":"JAMA"},{"key":"9974_CR76","doi-asserted-by":"crossref","unstructured":"Wang S, Kang B, Ma J, Zeng X, Xiao M, Guo J, Cai M, Yang J, Li Y, Meng X et al (2020b) A deep learning algorithm using ct images to screen for corona virus disease (covid-19). MedRxiv","DOI":"10.1101\/2020.02.14.20023028"},{"key":"9974_CR77","unstructured":"Web scraper and analyzer of COVID-related Android apps (2020) https:\/\/github.com\/iivanoo\/covid-apps-observer"},{"issue":"6483","key":"9974_CR78","doi-asserted-by":"publisher","first-page":"1260","DOI":"10.1126\/science.abb2507","volume":"367","author":"D Wrapp","year":"2020","unstructured":"Wrapp D, Wang N, Corbett KS, Goldsmith JA, Hsieh CL, Abiona O, Graham BS, McLellan JS (2020) Cryo-em structure of the 2019-ncov spike in the prefusion conformation. Science 367(6483):1260\u20131263","journal-title":"Science"},{"key":"9974_CR79","doi-asserted-by":"crossref","unstructured":"Zhang M, Duan Y, Yin H, Zhao Z (2014) Semantics-aware android malware classification using weighted contextual api dependency graphs. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pp 1105\u20131116","DOI":"10.1145\/2660267.2660359"},{"key":"9974_CR80","doi-asserted-by":"crossref","unstructured":"Zhou Y, Jiang X (2012) Dissecting android malware: characterization and evolution. In: 2012 IEEE symposium on security and privacy. IEEE, pp 95\u2013109","DOI":"10.1109\/SP.2012.16"},{"key":"9974_CR81","doi-asserted-by":"crossref","unstructured":"Zhou W, Zhou Y, Jiang X, Ning P (2012) Detecting repackaged smartphone applications in third-party android marketplaces. In: Proceedings of the second ACM conference on data and application security and privacy, pp 317\u2013326","DOI":"10.1145\/2133601.2133640"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-021-09974-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-021-09974-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-021-09974-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,4]],"date-time":"2023-11-04T20:58:34Z","timestamp":1699131514000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-021-09974-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,12]]},"references-count":81,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["9974"],"URL":"https:\/\/doi.org\/10.1007\/s10664-021-09974-4","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,12]]},"assertion":[{"value":"27 April 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 June 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}],"article-number":"82"}}