{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:17:03Z","timestamp":1770229023722,"version":"3.49.0"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Hubei Key Project","award":["2023BAA024"],"award-info":[{"award-number":["2023BAA024"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1109\/tr.2023.3304389","type":"journal-article","created":{"date-parts":[[2023,9,7]],"date-time":"2023-09-07T17:32:17Z","timestamp":1694107937000},"page":"757-770","source":"Crossref","is-referenced-by-count":2,"title":["An Empirical Study on Android Malware Characterization by Social Network Analysis"],"prefix":"10.1109","volume":"73","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0848-9528","authenticated-orcid":false,"given":"Haojun","family":"Zhao","sequence":"first","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1515-3558","authenticated-orcid":false,"given":"Yueming","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanyang Technological University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8534-5048","authenticated-orcid":false,"given":"Deqing","family":"Zou","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3934-7605","authenticated-orcid":false,"given":"Hai","family":"Jin","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/35075138"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0407994102"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(96)00300-0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00023"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3442588"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/pst.2018.8514216"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464833"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382224"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2353996"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2517312.2517315"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660359"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635869"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2861405"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2880731"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102513"},{"key":"ref18","first-page":"659","article-title":"Finding unknown malice in 10 seconds: Mass vetting for new threats at the Google-Play scale","volume-title":"Proc. 24th USENIX Secur. Symp.","author":"Chen","year":"2015"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568286"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102386"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"468","DOI":"10.1145\/2901739.2903508","article-title":"AndroZoo: Collecting millions of Android apps for the research community","volume-title":"Proc. 13th Work. Conf. Mining Softw. Repositories","author":"Allix","year":"2016"},{"key":"ref22","article-title":"Androguard: Reverse engineering and pentesting for Android applications","author":"Desnos","year":"2022"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(78)90021-7"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289026"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-4371(00)00311-3"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0053095"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2280884"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(01)00035-1"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"ref30","article-title":"Virustotal - free online virus, Malware and URL scanner","author":"Sistemas","year":"2022"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295141"},{"issue":"4","key":"ref33","first-page":"50","article-title":"Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets","volume-title":"Proc. Annu. Symp. Netw. Distrib. Syst. Secur.","volume":"25","author":"Zhou","year":"2012"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2789219"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23353"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.50"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274744"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180223"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.61"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274731"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2536605"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9539-8"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23379"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3162625"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2016.0155"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/SSIC.2018.8556755"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SmartIoT.2018.00034"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.07.030"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2019.8685502"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2932228"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2925929"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2022.3219082"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2579364"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/10460370\/10243129.pdf?arnumber=10243129","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T01:00:51Z","timestamp":1733878851000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10243129\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":53,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tr.2023.3304389","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3]]}}}