{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T15:54:27Z","timestamp":1748361267230,"version":"3.37.3"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T00:00:00Z","timestamp":1596067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T00:00:00Z","timestamp":1596067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Iran J Comput Sci"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s42044-020-00068-w","type":"journal-article","created":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T11:28:10Z","timestamp":1596108490000},"page":"95-114","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["LimonDroid: a system coupling three signature-based schemes for profiling Android malware"],"prefix":"10.1007","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0723-2640","authenticated-orcid":false,"given":"Franklin","family":"Tchakount\u00e9","sequence":"first","affiliation":[]},{"given":"Roger Corneille Ndjeumou","family":"Ngassi","sequence":"additional","affiliation":[]},{"given":"Vivient Corneille","family":"Kamla","sequence":"additional","affiliation":[]},{"given":"Kalum Priyanath","family":"Udagepola","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,30]]},"reference":[{"key":"68_CR1","unstructured":"AMD: Android malware dataset (2019). http:\/\/amd.arguslab.org\/. Accessed 15 Apr 2019"},{"key":"68_CR2","unstructured":"AOSP: Security (2019). https:\/\/source.android.com\/security\/"},{"key":"68_CR3","unstructured":"AppBrain: Top manufacturers (2019). https:\/\/www.appbrain.com\/stats\/top-manufacturers"},{"issue":"2","key":"68_CR4","doi-asserted-by":"publisher","first-page":"466","DOI":"10.14569\/IJACSA.2016.070262","volume":"7","author":"S Arshad","year":"2016","unstructured":"Arshad, S., Ali, M., Khan, A., Ahmed, M.: Android malware detection & protection: a survey. Int. J. Adv. Comput. Sci. Appl. 7(2), 466 (2016). https:\/\/doi.org\/10.14569\/IJACSA.2016.070262","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"68_CR5","doi-asserted-by":"publisher","first-page":"59540","DOI":"10.1109\/ACCESS.2018.2874502","volume":"6","author":"A Atzeni","year":"2018","unstructured":"Atzeni, A., Diaz, F., Marcelli, A., Sanchez, A., Squillero, G., Tonda, A.: Countering android malware: a scalable semi-supervised approach for family-signature generation. IEEE Access 6, 59540\u201359556 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2874502","journal-title":"IEEE Access"},{"key":"68_CR6","unstructured":"Bagnall, R.J., French, G.: The Malware Rating System (MRS)$$^{{\\rm TM}}$$. In: Proceedings of the 6th International Command and Control Research and Technology Symposium. Annapolis (2001)"},{"issue":"1","key":"68_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3301285","volume":"52","author":"P Bhat","year":"2019","unstructured":"Bhat, P., Dutta, K.: A survey on various threats and current state of security in android platform. ACM Comput. Surv. 52(1), 1\u201335 (2019). https:\/\/doi.org\/10.1145\/3301285","journal-title":"ACM Comput. Surv."},{"key":"68_CR8","doi-asserted-by":"publisher","unstructured":"Biondi, F., Dechelle, F., Legay, A.: MASSE: Modular automated syntactic signature extraction. In: Proceedings\u20142017 IEEE 28th International Symposium on Software Reliability Engineering Workshops, ISSREW 2017, pp. 96\u201397. IEEE (2017). https:\/\/doi.org\/10.1109\/ISSREW.2017.74","DOI":"10.1109\/ISSREW.2017.74"},{"key":"68_CR9","doi-asserted-by":"publisher","unstructured":"Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for Android. In: Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM \u201911, p.\u00a015. ACM Press, New York, New York, USA (2011). https:\/\/doi.org\/10.1145\/2046614.2046619","DOI":"10.1145\/2046614.2046619"},{"key":"68_CR10","unstructured":"Castillo, C.a.: Android malware past , present , and future (2011). http:\/\/www.mcafee.com\/us\/ resources\/white-papers\/wp-android-malware-past-present-future.pdf. Accessed 23 Oct 2019"},{"key":"68_CR11","unstructured":"Check point: viking horde: a new type of android malware on google play | check point software blog (2019). https:\/\/blog.checkpoint.com\/2016\/05\/09\/viking-horde-a-new-type-of-android-malware-on-google-play\/. Accessed 16 Apr 2019"},{"issue":"1","key":"68_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11416-015-0261-z","volume":"13","author":"A Damodaran","year":"2017","unstructured":"Damodaran, A., Troia, F.D., Visaggio, C.A., Austin, T.H., Stamp, M.: A comparison of static, dynamic, and hybrid analysis for malware detection. J. Comput. Virol. Hacking Tech. 13(1), 1\u201312 (2017). https:\/\/doi.org\/10.1007\/s11416-015-0261-z","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"68_CR13","unstructured":"Davi, L., Dmitrienko, A., Liebchen, C., Sadeghi, A.R.: Over-the-air cross-platform infection for Breaking mTAN-based online banking authentication (2012)"},{"issue":"2","key":"68_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2089125.2089126","volume":"44","author":"M Egele","year":"2012","unstructured":"Egele, M., Scholte, T., Kirda, E., Kruegel, C.: A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surv. (CSUR) 44(2), 1\u201342 (2012)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"2","key":"68_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2619091","volume":"32","author":"W Enck","year":"2014","unstructured":"Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: TaintDroid. ACM Trans. Comput. Syst. 32(2), 1\u201329 (2014). https:\/\/doi.org\/10.1145\/2619091","journal-title":"ACM Trans. Comput. Syst."},{"key":"68_CR16","doi-asserted-by":"publisher","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: Proceedings of the 16th ACM conference on computer and communications security\u2014CCS \u201909, p. 235. ACM Press, New York, New York, USA (2009). https:\/\/doi.org\/10.1145\/1653662.1653691","DOI":"10.1145\/1653662.1653691"},{"issue":"2","key":"68_CR17","doi-asserted-by":"publisher","first-page":"998","DOI":"10.1109\/COMST.2014.2386139","volume":"17","author":"P Faruki","year":"2015","unstructured":"Faruki, P., Bharmal, A., Laxmi, V., Ganmoor, V., Gaur, M.S., Conti, M., Rajarajan, M.: Android security: a survey of issues, malware penetration, and defenses. IEEE Commun. Surv. Tutorials 17(2), 998\u20131022 (2015). https:\/\/doi.org\/10.1109\/COMST.2014.2386139","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"68_CR18","doi-asserted-by":"publisher","unstructured":"Faruki, P., Ganmoor, V., Laxmi, V., Gaur, M.S., Bharmal, A.: AndroSimilar: robust signature for detecting variants of android malware. In: Proceedings of the 6th International Conference on Security of Information and Networks\u2014SIN \u201913, pp. 152\u2013159. ACM Press, New York, New York, USA (2013). https:\/\/doi.org\/10.1145\/2523514.2523539","DOI":"10.1145\/2523514.2523539"},{"key":"68_CR19","doi-asserted-by":"publisher","unstructured":"Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of the Eighth Symposium on Usable Privacy and Security - SOUPS \u201912, p.\u00a01. ACM Press, New York, New York, USA (2012). https:\/\/doi.org\/10.1145\/2335356.2335360","DOI":"10.1145\/2335356.2335360"},{"key":"68_CR20","unstructured":"GDATA: Some 343 new android malware samples every hour in 2017 (2018). https:\/\/www.gdatasoftware.com\/blog\/2018\/02\/30491-some-343-new-android-malware-samples-every-hour-in-2017"},{"key":"68_CR21","unstructured":"Google: google find my device (2019). https:\/\/www.google.com\/android\/find?u=0. Accessed 28 July 2019"},{"key":"68_CR22","unstructured":"Google: Google Play Protect: Securing 2 billion users daily (2019). https:\/\/www.android.com\/play-protect\/"},{"key":"68_CR23","unstructured":"Google: google safe browsing (2019). https:\/\/safebrowsing.google.com\/. Accessed 28 July 2019"},{"key":"68_CR24","unstructured":"Google: SafetyNet attestation API (2019). https:\/\/developer.android.com\/training\/safetynet\/attestation. Accessed 28 July 2019"},{"issue":"1","key":"68_CR25","doi-asserted-by":"publisher","first-page":"109","DOI":"10.13052\/jcsm2245-1439.719","volume":"7","author":"A Gopalakrishnan","year":"2018","unstructured":"Gopalakrishnan, A., Vineti, E., Mohan, A.K., Sethumadhavan, M.: The art of piecewise hashing: a StepToward better evidence provability. J. Cyber Security Mobility 7(1), 109\u2013130 (2018). https:\/\/doi.org\/10.13052\/jcsm2245-1439.719","journal-title":"J. Cyber Security Mobility"},{"key":"68_CR26","unstructured":"HCRL: Andro-Profiler (2019). http:\/\/ocslab.hksecurity.net\/andro-profiler. Accessed 16 Apr 2019"},{"key":"68_CR27","unstructured":"Kim, J., Yoon, Y., Yi, K., Shin, J., Center, S.: ScanDal: Static analyzer for detecting privacy leaks in android applications. In: MoST, vol.\u00a012 (2012). https:\/\/pdfs.semanticscholar.org\/7520\/336ec2a08ad4fcbc5073082a8318571d679c.pdf. Accessed 17 Apr 2019"},{"issue":"SUPPL.","key":"68_CR28","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.diin.2006.06.015","volume":"3","author":"J Kornblum","year":"2006","unstructured":"Kornblum, J.: Identifying almost identical files using context triggered piecewise hashing. Digital Investigation 3(SUPPL.), 91\u201397 (2006). https:\/\/doi.org\/10.1016\/j.diin.2006.06.015","journal-title":"Digital Investigation"},{"key":"68_CR29","unstructured":"Kornblum, J.: ssdeep\u2014Fuzzy Hashing Program (2018)"},{"issue":"7","key":"68_CR30","doi-asserted-by":"publisher","first-page":"3216","DOI":"10.1109\/TII.2017.2789219","volume":"14","author":"J Li","year":"2018","unstructured":"Li, J., Sun, L., Yan, Q., Li, Z., Srisa-An, W., Ye, H.: Significant permission identification for machine-learning-based android malware detection. IEEE Trans. Indu. Inform. 14(7), 3216\u20133225 (2018). https:\/\/doi.org\/10.1109\/TII.2017.2789219","journal-title":"IEEE Trans. Indu. Inform."},{"key":"68_CR31","doi-asserted-by":"publisher","unstructured":"Lindorfer, M., Neugschwandtner, M., Weichselbaum, L., Fratantonio, Y., Veen, V.V.D., Platzer, C.: ANDRUBIS - 1,000,000 Apps Later: A View on Current Android Malware Behaviors. In: Proceedings\u20143rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS 2014, pp. 3\u201317. IEEE (2016). https:\/\/doi.org\/10.1109\/BADGERS.2014.7","DOI":"10.1109\/BADGERS.2014.7"},{"key":"68_CR32","unstructured":"Monnappa, K.: Limon Sandbox for Analyzing Linux Malwares\u2014Cysinfo (2015). https:\/\/cysinfo.com\/limon-sandbox-for-analyzing-linux-malwares-2\/"},{"key":"68_CR33","unstructured":"Ndjeumou, R.: Roger-NDJEUMOU\/LimonDroid (2018). https:\/\/github.com\/Roger-NDJEUMOU\/LimonDroid"},{"key":"68_CR34","doi-asserted-by":"publisher","unstructured":"Odusami, M., Abayomi-Alli, O., Misra, S., Shobayo, O., Damasevicius, R., Maskeliunas, R.: Android malware detection: a survey. In: Communications in Computer and Information Science, vol. 942, pp. 255\u2013266. IEEE (2018). https:\/\/doi.org\/10.1007\/978-3-030-01535-0_19","DOI":"10.1007\/978-3-030-01535-0_19"},{"key":"68_CR35","unstructured":"Offensive security: metasploit unleashed\u2014free online ethical hacking course (2019). https:\/\/www.offensive-security.com\/metasploit-unleashed\/"},{"key":"68_CR36","doi-asserted-by":"publisher","unstructured":"Park, J., Chun, H., Jung, S.: API and permission-based classification system for android malware analysis. In: International Conference on Information Networking, vol. 2018-Janua, pp. 930\u2013935. IEEE (2018). https:\/\/doi.org\/10.1109\/ICOIN.2018.8343260","DOI":"10.1109\/ICOIN.2018.8343260"},{"key":"68_CR37","unstructured":"Popper, B.: Google announces over 2 billion monthly active devices on Android (2017). https:\/\/www.theverge.com\/2017\/5\/17\/15654454\/android-reaches-2-billion-monthly-active-users. Accessed 18 July 2019"},{"key":"68_CR38","doi-asserted-by":"publisher","unstructured":"Rastogi, V., Qu, Z., McClurg, J., Cao, Y., Chen, Y.: Uranine: Real-time privacy leakage monitoring without system modification for android. In: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, vol. 164, pp. 256\u2013276. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-28865-9_14","DOI":"10.1007\/978-3-319-28865-9_14"},{"key":"68_CR39","doi-asserted-by":"publisher","unstructured":"Raveendranath, R., Rajamani, V., Babu, A.J., Datta, S.K.: Android malware attacks and countermeasures: current and future directions. In: 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies, ICCICCT 2014, pp. 137\u2013143. IEEE (2014). https:\/\/doi.org\/10.1109\/ICCICCT.2014.6992944","DOI":"10.1109\/ICCICCT.2014.6992944"},{"key":"68_CR40","doi-asserted-by":"publisher","unstructured":"Roussev, V.: Data fingerprinting with similarity digests. In: IFIP Advances in information and communication technology, vol. 337 AICT, pp. 207\u2013226. Springer, Berlin, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15506-2_15","DOI":"10.1007\/978-3-642-15506-2_15"},{"key":"68_CR41","doi-asserted-by":"publisher","unstructured":"Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X., Bringas, P.G., \u00c1lvarez, G.: PUMA: Permission usage to detect malware in android. In: Advances in Intelligent Systems and Computing, vol. 189 AISC, pp. 289\u2013298. Springer, Berlin, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-33018-6_30","DOI":"10.1007\/978-3-642-33018-6_30"},{"key":"68_CR42","doi-asserted-by":"publisher","unstructured":"Sarantinos, N., Benza\u00efd, C., Arabiat, O., Al-Nemrat, A.: Forensic malware analysis: The value of fuzzy hashing algorithms in identifying similarities. In: Proceedings\u201415th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Proce, pp. 1782\u20131787. IEEE (2016). https:\/\/doi.org\/10.1109\/TrustCom.2016.0274","DOI":"10.1109\/TrustCom.2016.0274"},{"issue":"1","key":"68_CR43","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s10844-010-0148-x","volume":"38","author":"A Shabtai","year":"2012","unstructured":"Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: \u201cAndromaly\u201d: a behavioral malware detection framework for android devices. J. Intell. Inform. Syst. 38(1), 161\u2013190 (2012). https:\/\/doi.org\/10.1007\/s10844-010-0148-x","journal-title":"J. Intell. Inform. Syst."},{"key":"68_CR44","unstructured":"Smith, C.: Most advanced Android malware threat yet: Backdoor.AndroidOS.Obad.a (2013). https:\/\/www.androidauthority.com\/advanced-android-malware-threat-backdoor-androidos-obad-a-223800\/. Accessed 17 Apr 2019"},{"key":"68_CR45","unstructured":"Sponchioni, R.: Android.Fakedefender.B | Symantec (2013). https:\/\/www.symantec.com\/security-center\/writeup\/2013-091013-3953-99. Accessed 15 Apr 2019"},{"key":"68_CR46","unstructured":"Statista: most popular global mobile messenger apps as of december 2014, based on number of monthly active users (2015). http:\/\/www.statista.com\/statistics\/258749\/most-popular-global-mobile-messenger-apps\/. Accessed 16 Apr 2019"},{"key":"68_CR47","doi-asserted-by":"publisher","unstructured":"Struse, E., Seifert, J., \u00dcllenbeck, S., Rukzio, E., Wolf, C.: PermissionWatcher: creating user awareness of application permissions in mobile systems. In: International Joint Conference on Ambient Intelligence, pp. 65\u201380. Springer, Berlin, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34898-3_5","DOI":"10.1007\/978-3-642-34898-3_5"},{"issue":"3\u20134","key":"68_CR48","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.diin.2011.10.003","volume":"8","author":"J Sylve","year":"2012","unstructured":"Sylve, J., Case, A., Marziale, L., Richard, G.G.: Acquisition and analysis of volatile memory from android devices. Digital Investigation 8(3\u20134), 175\u2013184 (2012). https:\/\/doi.org\/10.1016\/j.diin.2011.10.003","journal-title":"Digital Investigation"},{"key":"68_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.diin.2015.01.001","volume":"13","author":"KA Talha","year":"2015","unstructured":"Talha, K.A., Alper, D.I., Aydin, C.: APK auditor: permission-based android malware detection system. Digital Investigation 13, 1\u201314 (2015). https:\/\/doi.org\/10.1016\/j.diin.2015.01.001","journal-title":"Digital Investigation"},{"key":"68_CR50","doi-asserted-by":"publisher","unstructured":"Vidas, T., Christin, N.: Evading android runtime analysis via sandbox detection. In: Proceedings of the 9th ACM symposium on Information, computer and communications security\u2014ASIA CCS \u201914, pp. 447\u2013458. ACM Press, New York, New York, USA (2014). https:\/\/doi.org\/10.1145\/2590296.2590325","DOI":"10.1145\/2590296.2590325"},{"key":"68_CR51","unstructured":"VirusTotal: VirusTotal (2019). https:\/\/www.virustotal.com\/gui\/home\/upload. Accessed 16 Apr 2019"},{"issue":"11","key":"68_CR52","doi-asserted-by":"publisher","first-page":"1869","DOI":"10.1109\/TIFS.2014.2353996","volume":"9","author":"W Wang","year":"2014","unstructured":"Wang, W., Wang, X., Feng, D., Liu, J., Han, Z., Zhang, X.: Exploring permission-induced risk in android applications for malicious application detection. IEEE Trans. Inform. Forensics Security 9(11), 1869\u20131882 (2014). https:\/\/doi.org\/10.1109\/TIFS.2014.2353996","journal-title":"IEEE Trans. Inform. Forensics Security"},{"key":"68_CR53","unstructured":"Yan, L.K., Yin, H.: DroidScope: seamlessly reconstructing the OS and Dalvik semantic views for dynamic Android malware analysis. In: Proceedings of the 21st USENIX conference on Security symposium, pp. 1\u201316. USENIX Association Berkeley, CA, USA, Bellevue, WA (2012)"},{"key":"68_CR54","unstructured":"YaraProject: YaraRules Project (2019). https:\/\/yararules.com\/. Accessed 28 July 2019"},{"key":"68_CR55","unstructured":"YaraRules: yara-rules\/rules (2019). https:\/\/github.com\/Yara-Rules\/rules"},{"key":"68_CR56","doi-asserted-by":"publisher","unstructured":"Zhang, F., Leach, K., Stavrou, A., Wang, H., Sun, K.: Using hardware features for increased debugging transparency. In: Proceedings\u2014IEEE Symposium on Security and Privacy, vol. 2015-July, pp. 55\u201369 (2015). https:\/\/doi.org\/10.1109\/SP.2015.11","DOI":"10.1109\/SP.2015.11"},{"key":"68_CR57","unstructured":"Zheng, C., Xiao, C., Xu, Z.: New Android Trojan \u201cXbot\u201d Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom (2016). https:\/\/unit42.paloaltonetworks.com\/new-android-trojan-xbot-phishes-credit-cards-and-bank-accounts-encrypts-devices-for-ransom\/"},{"key":"68_CR58","doi-asserted-by":"publisher","unstructured":"Zheng, M., Sun, M., Lui, J.C.: Droid analytics: A signature based analytic system to collect, extract, analyze and associate android malware. In: Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013, pp. 163\u2013171. IEEE (2013). https:\/\/doi.org\/10.1109\/TrustCom.2013.25","DOI":"10.1109\/TrustCom.2013.25"},{"key":"68_CR59","unstructured":"Zhou, W., Hu, D., Su, J., Kang, Y.: RuMMS: the latest family of android malware attacking users in Russia via SMS phishing RuMMS: The Latest Family of Android Malware Attacking Users in Russia Via SMS Phishing | FireEye Inc (2016)"},{"key":"68_CR60","doi-asserted-by":"publisher","unstructured":"Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting repackaged smartphone applications in third-party android marketplaces. In: Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY \u201912, p. 317. ACM Press, New York, New York, USA (2012). https:\/\/doi.org\/10.1145\/2133601.2133640","DOI":"10.1145\/2133601.2133640"},{"key":"68_CR61","doi-asserted-by":"publisher","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: Proceedings - IEEE Symposium on Security and Privacy, pp. 95\u2013109. IEEE (2012). https:\/\/doi.org\/10.1109\/SP.2012.16","DOI":"10.1109\/SP.2012.16"}],"container-title":["Iran Journal of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42044-020-00068-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42044-020-00068-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42044-020-00068-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,29]],"date-time":"2021-07-29T23:06:06Z","timestamp":1627599966000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42044-020-00068-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,30]]},"references-count":61,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["68"],"URL":"https:\/\/doi.org\/10.1007\/s42044-020-00068-w","relation":{},"ISSN":["2520-8438","2520-8446"],"issn-type":[{"type":"print","value":"2520-8438"},{"type":"electronic","value":"2520-8446"}],"subject":[],"published":{"date-parts":[[2020,7,30]]},"assertion":[{"value":"17 October 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 July 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}