{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:13:22Z","timestamp":1730236402495,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,6]]},"DOI":"10.1109\/iccr56254.2022.9995769","type":"proceedings-article","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T21:53:52Z","timestamp":1672782832000},"page":"1-12","source":"Crossref","is-referenced-by-count":39,"title":["Smartphone Security Hardening: Threats to Organizational Security and Risk Mitigation"],"prefix":"10.1109","author":[{"given":"Atif","family":"Ali","sequence":"first","affiliation":[{"name":"Research Management Centre (RMC), Multimedia University,Cyberjaye,Malaysia,63100"}]},{"given":"Nafees Ahmed","family":"Somroo","sequence":"additional","affiliation":[{"name":"Mehran University of Engineering and Technology Jamshoro,Sindh,Pakistan"}]},{"given":"Umer","family":"Farooq","sequence":"additional","affiliation":[{"name":"LGU,Department of Computer Science,Lahore,Pakistan"}]},{"given":"Muhammad","family":"Asif","sequence":"additional","affiliation":[{"name":"National College of Business Administration and Economics,Lahore,Pakistan"}]},{"given":"Iman","family":"Akour","sequence":"additional","affiliation":[{"name":"University of Sharjah,Information systems Department,United Arab Emirates"}]},{"given":"Wathiq","family":"Mansoor","sequence":"additional","affiliation":[{"name":"College of Engineering and IT, University of Dubai"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/b978-0-12-809641-3.00023-5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-87459-9_3"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.11610\/isij.3803"},{"key":"ref4","first-page":"100365","article-title":"A survey of Android application and mal ware hardening","volume-title":"Computer Science Review","volume":"39","author":"Sihag","year":"2021"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1130\/abs\/2016AM-281072"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICIC53490.2021.9692954"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1001\/jamaoto.2018.0647"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-8176-5.ch074"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1080\/15416518.2012.666951"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5220\/0006758105890596"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5755\/j01.itc.50.3.27622"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CBI49978.2020.10068"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1201\/9781315369426-2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/sec.580"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/rtuwo.2018.8587910"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/9781119051091.ch5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-18760"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/4243700"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/s22145247"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3004536"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.023557"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-019-1873-6"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.023785"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxaa068"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.023278"},{"issue":"1","key":"ref26","first-page":"188","volume":"6","author":"Fatima","year":"2020","journal-title":"IoT enabled smart monitoring of coronavirus empowered with fuzzy inference system. International journal of advance research, ideas and innovations in technology"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCE47252.2019.8940752"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICBATS54253.2022.9758929"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2022.03.003"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2021.12.008"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICOMET.2019.8673401"},{"issue":"1","key":"ref32","first-page":"I","volume":"1","author":"Muhammad","year":"2022","journal-title":"Intrusion Detection System for Apache Web Server Empowered with Machine Learning Approaches, International Journal of Computational and Innovative Sciences"},{"issue":"2","key":"ref33","first-page":"69","article-title":"AA Novel Method to improve the Round Robin CPU Scheduling Quantum time using Arithmetic Mean","volume":"1","author":"Akmal","year":"2022","journal-title":"International Journal of Computational and Innovative Sciences"},{"issue":"2","key":"ref34","first-page":"51","article-title":"Distributed autonomous Organization Security in Blockchain:(DAO Attack)","volume":"1","author":"Chughtia","year":"2022","journal-title":"International Journal of Computational and Innovative Sciences"},{"issue":"1","key":"ref35","first-page":"16","article-title":"Performance Analysis of Multiple Networks of Blockchain with Varying Transaction","volume":"1","author":"Iftikhar","year":"2022","journal-title":"International Journal of Advanced Sciences and Computing"},{"issue":"1","key":"ref36","article-title":"Genetic Algorithm Based Intelligent System for Estate Value Estimation","volume":"1","author":"Muneer","year":"2022","journal-title":"International Journal of Computational and Innovative Sciences"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.023392"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.029400"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3150924"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2022.06.007"}],"event":{"name":"2022 International Conference on Cyber Resilience (ICCR)","start":{"date-parts":[[2022,10,6]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2022,10,7]]}},"container-title":["2022 International Conference on Cyber Resilience (ICCR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9995718\/9995732\/09995769.pdf?arnumber=9995769","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T12:47:56Z","timestamp":1706791676000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9995769\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,6]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/iccr56254.2022.9995769","relation":{},"subject":[],"published":{"date-parts":[[2022,10,6]]}}}