{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T22:21:40Z","timestamp":1750026100446},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/dictap.2014.6821695","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T20:01:18Z","timestamp":1401480078000},"page":"275-278","source":"Crossref","is-referenced-by-count":4,"title":["Design of authenticity evaluation metric for Android applications"],"prefix":"10.1109","author":[{"given":"Won","family":"Shin","sequence":"first","affiliation":[]},{"given":"Jin-Lee","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Doo-Ho","family":"Park","sequence":"additional","affiliation":[]},{"given":"Chun-Hyon","family":"Chang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1109\/SP.2012.16","article-title":"Dissecting android malware: Characterization and evolution. in security and privacy (sp)","author":"zhou","year":"2012","journal-title":"2012 IEEE Symposium on"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1145\/2382756.2382781"},{"year":"0","journal-title":"Android Permissions","key":"12"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1145\/2046707.2046779"},{"key":"2","article-title":"A preliminary survey of knowledge discovery on smartphone applications (apps): Principles, techniques and research directions for e-health","author":"su","year":"2014","journal-title":"The 2014 ICME International Conference on Complex Medical Engineering"},{"year":"2013","author":"gartner","journal-title":"Gartner Says Annual Smartphone Sales Surpassed Sales of Feature Phones for the First Time in","key":"1"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/SERE-C.2013.11"},{"year":"0","journal-title":"Android Security Overview","key":"7"},{"year":"0","key":"6"},{"key":"5","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1145\/2508859.2516689","article-title":"Vetting undesirable behaviors in android apps with permission use analysis","author":"zhang","year":"2013","journal-title":"Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/WCSE.2012.26"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1145\/2335356.2335360"},{"key":"8","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1007\/978-3-319-01604-7_40","article-title":"Android security, pitfalls and lessons learned","author":"liebergeld","year":"2013","journal-title":"Information Sciences and Systems 2013"}],"event":{"name":"2014 Fourth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)","start":{"date-parts":[[2014,5,6]]},"location":"Bangkok, Thailand","end":{"date-parts":[[2014,5,8]]}},"container-title":["2014 Fourth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6816614\/6821645\/06821695.pdf?arnumber=6821695","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,11]],"date-time":"2019-08-11T04:46:55Z","timestamp":1565498815000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6821695\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/dictap.2014.6821695","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}