{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:45:00Z","timestamp":1725594300420},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/icacci.2018.8554509","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T01:17:32Z","timestamp":1543886252000},"page":"1412-1417","source":"Crossref","is-referenced-by-count":1,"title":["Android Dashboard for Past and Present Processes"],"prefix":"10.1109","author":[{"given":"R.","family":"Anusuya","sequence":"first","affiliation":[]},{"given":"Prabhaker","family":"Mateti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.08.010"},{"journal-title":"Os monitor","year":"2015","key":"ref11"},{"journal-title":"Design and construction of a new highly secure Android ROM","year":"2015","author":"mateti","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23145"},{"journal-title":"CopperheadOS A security and privacy focused mobile operating system compatible with Android apps","year":"2017","author":"copperhead","key":"ref14"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2008.79"},{"journal-title":"Android Dashboard of Processes Past and Present","year":"2016","author":"anusuya","key":"ref3"},{"key":"ref6","first-page":"43","article-title":"Provenance-aware storage systems","author":"muniswamy-reddy","year":"2006","journal-title":"USENIX Annual Technical Conference General Track"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89965-5_13"},{"key":"ref8","first-page":"101","article-title":"SPADE: Support for provenance auditing in distributed environments","author":"gehani","year":"2012","journal-title":"Proceedings of the 13th International Middleware Conference"},{"key":"ref7","first-page":"5","article-title":"Securing provenance","author":"braun","year":"2008","journal-title":"Proc USENIX Hotsec 2008"},{"journal-title":"Android Security Internals An In-Depth Guide to Android's Security Architecture","year":"2014","author":"elenkov","key":"ref2"},{"journal-title":"Embedded Android Porting Extending and Customizing","year":"2013","author":"yaghmour","key":"ref1"},{"key":"ref9","first-page":"257","article-title":"Droid-Barrier: Know what is executing on your Android","author":"almohri","year":"2014","journal-title":"Proceedings of the 4th ACM conference on Data and Application Security and Privacy"}],"event":{"name":"2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2018,9,19]]},"location":"Bangalore","end":{"date-parts":[[2018,9,22]]}},"container-title":["2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8536361\/8554361\/08554509.pdf?arnumber=8554509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T02:59:51Z","timestamp":1643252391000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8554509\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icacci.2018.8554509","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}