{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:37:19Z","timestamp":1729622239152,"version":"3.28.0"},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/iccse.2016.7581615","type":"proceedings-article","created":{"date-parts":[[2016,10,6]],"date-time":"2016-10-06T18:03:48Z","timestamp":1475777028000},"page":"405-412","source":"Crossref","is-referenced-by-count":1,"title":["Personal APP behavior analysis based on mobile device networks"],"prefix":"10.1109","author":[{"given":"Cheng-Hung","family":"Tsai","sequence":"first","affiliation":[]},{"given":"Zhi-Guo","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Tsun","family":"Ku","sequence":"additional","affiliation":[]},{"given":"Wu-Fan","family":"Chien","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVE.2015.10"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4018\/ijitn.2015010105"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2015.07.676"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2010.137"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CCCS.2015.7374148"},{"key":"ref7","article-title":"Persona Analysis with Text Topic Modelling","author":"zheng","year":"2012","journal-title":"Proceedings of IEEE ACAI"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1109\/TSMC.2013.2263128","article-title":"A Trust-Aware System for Personalized User Recommendations in Social Networks","volume":"44","author":"louta","year":"2014","journal-title":"IEEE Transactions on Systems Man and Cybernetics"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1109\/TDSC.2014.2355824","article-title":"Trust-Based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks","volume":"12","author":"zhang","year":"2015","journal-title":"IEEE Transactions on Dependable and Secure Computing"}],"event":{"name":"2016 11th International Conference on Computer Science & Education (ICCSE)","start":{"date-parts":[[2016,8,23]]},"location":"Nagoya, Japan","end":{"date-parts":[[2016,8,25]]}},"container-title":["2016 11th International Conference on Computer Science &amp; Education (ICCSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7579273\/7581525\/07581615.pdf?arnumber=7581615","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T20:31:37Z","timestamp":1498336297000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7581615\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/iccse.2016.7581615","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}