{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:57:26Z","timestamp":1760245046218},"reference-count":15,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2016,7,1]],"date-time":"2016-07-01T00:00:00Z","timestamp":1467331200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Consumer Electron. Mag."],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1109\/mce.2016.2558218","type":"journal-article","created":{"date-parts":[[2016,8,10]],"date-time":"2016-08-10T20:08:15Z","timestamp":1470859695000},"page":"3-36","source":"Crossref","is-referenced-by-count":2,"title":["The Battle for Privacy In Your Pocket [Notes from the Editor]"],"prefix":"10.1109","volume":"5","author":[{"given":"Peter","family":"Corcoran","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.493"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2015.611"},{"key":"ref12","author":"fogel","year":"2015","journal-title":"A Survey of Web Vulnerabilities"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.41"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.12"},{"key":"ref15","year":"2014","journal-title":"Prying eyes Inside the NSA's war on Internet security"},{"key":"ref4","first-page":"219","article-title":"The trend of mobile malwares and effective detection techniques","volume":"219","author":"adebayo","year":"2015","journal-title":"Critical Socio-Tech Issues Surrounding Mobile Computing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2015.123"},{"key":"ref6","first-page":"555","article-title":"Risk assessment of buffer &#x2018;heartbleed&#x2019; over-read vulnerabilities (practical experience report)","author":"wang","year":"0","journal-title":"Proc 45th Int Annu IEEE\/IFIP"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663755"},{"key":"ref8","author":"hill","year":"2015","journal-title":"Evading network based intrusion detection systems"},{"key":"ref7","article-title":"After Heartbleed bug, a race to plug Internet hole","author":"yadron","year":"2014","journal-title":"Wall St J"},{"key":"ref2","article-title":"Jekyll on iOS: When benign apps become evil","author":"wang","year":"0"},{"key":"ref1","article-title":"New age application attacks against Apple's iOS (and countermeasures)","author":"dhanjani","year":"0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813707"}],"container-title":["IEEE Consumer Electronics Magazine"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5962380\/7539234\/07539241.pdf?arnumber=7539241","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:03:00Z","timestamp":1642003380000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7539241\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":15,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/mce.2016.2558218","relation":{},"ISSN":["2162-2248","2162-2256"],"issn-type":[{"value":"2162-2248","type":"print"},{"value":"2162-2256","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7]]}}}