{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T20:03:52Z","timestamp":1746302632413,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/pst.2014.6890950","type":"proceedings-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T11:43:34Z","timestamp":1410349414000},"page":"282-289","source":"Crossref","is-referenced-by-count":7,"title":["Another free app: Does it have the right intentions?"],"prefix":"10.1109","author":[{"given":"Mohamed","family":"Fazeen","sequence":"first","affiliation":[]},{"given":"Ram","family":"Dantu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"I-arm-droid: A rewriting framework for in-app reference monitors for android applications","author":"davis","year":"2012","journal-title":"IEEE Mobile Security Technologies (MoST)"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1145\/2420950.2420956"},{"key":"18","article-title":"Investigating user privacy in android ad libraries","author":"stevens","year":"2012","journal-title":"IEEE Mobile Security Technologies (MoST)"},{"year":"2012","author":"frank","journal-title":"Mining Permission Request Patterns from Android and Facebook Applications (Extended Author Version)","key":"15"},{"key":"16","article-title":"Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets","author":"zhou","year":"2012","journal-title":"Proceedings of the 19th Annual Network &distributed System Security Symposium"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/CIS.2010.77"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1145\/2420950.2420999"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/EIT.2011.5978583"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1145\/1866307.1866317"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1109\/ARES.2013.80"},{"year":"2012","author":"cluley","journal-title":"Revealed! the Top Five Android Malware Detected in the Wild","key":"3"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1145\/2046707.2046779"},{"year":"2012","journal-title":"Mobile Threat Report q2 2012","key":"2"},{"year":"2012","author":"lockheimer","journal-title":"Android and Security","key":"1"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/INFCOM.2013.6567003"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/CCNC.2012.6181075"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/TIFS.2013.2290431"},{"key":"5","volume":"159","author":"downey","year":"2011","journal-title":"Think Stats Probability and Statistics for Programmers"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/SP.2012.16"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/ICPR.2010.764"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1145\/1656274.1656278"}],"event":{"name":"2014 Twelfth Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2014,7,23]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2014,7,24]]}},"container-title":["2014 Twelfth Annual International Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6883276\/6890911\/06890950.pdf?arnumber=6890950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T21:57:28Z","timestamp":1490306248000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6890950\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/pst.2014.6890950","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}