{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:46:09Z","timestamp":1729619169427,"version":"3.28.0"},"reference-count":6,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/ictc.2014.6983285","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T23:52:42Z","timestamp":1419983562000},"page":"775-776","source":"Crossref","is-referenced-by-count":5,"title":["Security threats analysis for Android based Mobile Device"],"prefix":"10.1109","author":[{"given":"Seungyong","family":"Yoon","sequence":"first","affiliation":[]},{"given":"Yongsung","family":"Jeon","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"crossref","first-page":"9","DOI":"10.4156\/ijact.vol5.issue9.2","article-title":"A data-centric model for smartphone security","volume":"5","author":"dezfouli","year":"2013","journal-title":"IJACT"},{"journal-title":"McAfee Labs Threats Report-Fourth Quarer","year":"2013","key":"2"},{"key":"1","doi-asserted-by":"crossref","first-page":"459","DOI":"10.4156\/ijact.vol5.issue11.57","article-title":"Analysis of smartphone security problem-android and iphone","volume":"5","author":"kim","year":"2013","journal-title":"IJACT"},{"journal-title":"Wikipedia Rooting(Android OS)","year":"2014","key":"6"},{"key":"5","first-page":"477","article-title":"Rooting attack detection method on the android-based smart phone","author":"jang","year":"2011","journal-title":"Proc of ICCSN"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0148-x"}],"event":{"name":"2014 International Conference on Information and Communication Technology Convergence (ICTC)","start":{"date-parts":[[2014,10,22]]},"location":"Busan, South Korea","end":{"date-parts":[[2014,10,24]]}},"container-title":["2014 International Conference on Information and Communication Technology Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6966882\/6983064\/06983285.pdf?arnumber=6983285","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:31:33Z","timestamp":1602685893000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6983285"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":6,"URL":"https:\/\/doi.org\/10.1109\/ictc.2014.6983285","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}