{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T04:48:14Z","timestamp":1774932494077,"version":"3.50.1"},"reference-count":262,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T00:00:00Z","timestamp":1504224000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/legalcode"}],"funder":[{"name":"EPRSC","award":["EP\/J017515"],"award-info":[{"award-number":["EP\/J017515"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2017,9,1]]},"DOI":"10.1109\/tse.2016.2630689","type":"journal-article","created":{"date-parts":[[2016,12,2]],"date-time":"2016-12-02T19:29:22Z","timestamp":1480706962000},"page":"817-847","source":"Crossref","is-referenced-by-count":301,"title":["A Survey of App Store Analysis for Software Engineering"],"prefix":"10.1109","volume":"43","author":[{"given":"William","family":"Martin","sequence":"first","affiliation":[]},{"given":"Federica","family":"Sarro","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Yuanyuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Harman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","first-page":"3","article-title":"Update behavior in app markets and security implications: A case study in Google Play","author":"mller","year":"2012","journal-title":"Proceedings of the 3rd International Workshop on Research in the Large"},{"key":"ref172","article-title":"Trade-off service portfolio planning&#x2014;a case study on mining the Android app market","volume":"3","author":"nayebi","year":"2015","journal-title":"PeerJ PrePrints"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.88"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1145\/2468356.2468681"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2014.95"},{"key":"ref176","first-page":"291","article-title":"User reviews matter! tracking crowdsourced reviews to support evolution of successful apps","author":"palomba","year":"2015","journal-title":"31st International Conference on Software Maintenance and Evolution"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2013.6636712"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332474"},{"key":"ref177","first-page":"527","article-title":"WhyPer: Towards automating risk assessment of mobile applications","author":"pandita","year":"2013","journal-title":"Proc 22nd USENIX Conf Secur"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786857"},{"key":"ref169","first-page":"1","article-title":"A large-scale study of mobile web app security","author":"mutchler","year":"2015","journal-title":"Proc Workshop Mobile Secur Technol (MoST)"},{"key":"ref39","first-page":"659","article-title":"Finding unknown malice in 10 seconds: Mass vetting for new threats at the Google-Play scale","author":"chen","year":"2015","journal-title":"Proc 24th USENIX Conf Security Symp"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2184305.2184317"},{"key":"ref33","first-page":"242","article-title":"A longitudinal study of the Google app market","author":"carbunar","year":"2015","journal-title":"Proc Int Conf Adv Social Netw Anal Mining"},{"key":"ref32","article-title":"Google says there are now 1.4 billion active Android devices worldwide","author":"callaham","year":"2015"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2011.1"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.12"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462100"},{"key":"ref36","first-page":"25","article-title":"User comment analysis for Android apps and CSPI detection with comment expansion","author":"cen","year":"2014","journal-title":"Proc 1st Int Workshop on Privacy-Preserving IR"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974010.74"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2355839"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382224"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2013.53"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1201\/b11884-30"},{"key":"ref184","article-title":"Mobile applications, function points and cost estimating","author":"preuss","year":"2013","journal-title":"Proc Int Cost Estimation Anal Assoc Conf"},{"key":"ref183","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1007\/978-3-642-28166-2_11","article-title":"Plagiarizing smartphone applications: Attack strategies and defense techniques","author":"potharaju","year":"2012","journal-title":"Proc 4th Int Conf Eng Secure Softw Syst"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504749"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-44930-7_11"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594377"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435379"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660287"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2037373.2037383"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2010.5665792"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767759"},{"key":"ref29","first-page":"1","article-title":"Longitudinal analysis of Android ad library permissions","volume":"abs 1303 857","author":"book","year":"2013","journal-title":"Computer Research Repository-CORR"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2011.6112328"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2449396.2449434"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2367027"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695997"},{"key":"ref23","article-title":"Wise mobile icons organization: Apps taxonomy classification using functionality mining to ease apps finding","volume":"2016","author":"ben lulu","year":"2015","journal-title":"Mobile Inf Syst"},{"key":"ref26","first-page":"1021","article-title":"Brahmastra: Driving apps to test the security of third-party components","author":"bhoraskar","year":"2014","journal-title":"Proc 23rd USENIX Secur Symp"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.23"},{"key":"ref50","first-page":"37","article-title":"Attack of the clones: Detecting cloned applications on Android markets","author":"crussell","year":"2012","journal-title":"Proc 17th Eur Symp Res Comput Secur"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_11"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2015.19"},{"key":"ref153","first-page":"659","article-title":"Causal impact for app store analysis","author":"martin","year":"2016","journal-title":"Proc 38th Int Conf Softw Eng"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950320"},{"key":"ref155","article-title":"Causal impact analysis applied to app releases in Google Play and Windows Phone Store","author":"martin","year":"2015"},{"key":"ref150","article-title":"A survey of the use of crowdsourcing in software engineering","author":"mao","year":"2016"},{"key":"ref152","article-title":"World mobile applications market-advanced technologies, global forecast","year":"2010"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931054"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2015.7320414"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/MobServ.2015.14"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/MobileSoft.2015.15"},{"key":"ref149","first-page":"139","article-title":"One-class SVMs for document classification","volume":"2","author":"manevitz","year":"2002","journal-title":"J Mach Learn Res"},{"key":"ref59","first-page":"1","article-title":"TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones","author":"enck","year":"2010","journal-title":"Proc 9th USENIX Conf Operating Syst Des Implementation"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2396756.2396759"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2014.52"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813675"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695948"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUDCOM-ASIA.2013.56"},{"key":"ref53","article-title":"Androlyzer","year":"2015"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1145\/2594368.2594391","article-title":"MadFraud: Investigating ad fraud in Android applications","author":"crussell","year":"2014","journal-title":"Proc 12th Annu Int Conf Mobile Syst Appl Serv"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1940761.1940859"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671315"},{"key":"ref166","first-page":"527","article-title":"Mining and analysis of apps in Google Play","author":"mokarizadeh","year":"2013","journal-title":"Proc 9th Int Conf Web Inf Syst Technol"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2015.56"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.24"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.76"},{"key":"ref162","first-page":"262","article-title":"Optimizing semantic coherence in topic models","author":"mimno","year":"2011","journal-title":"Proc Conf Empirical Methods Natural Language Process"},{"key":"ref161","article-title":"Is it worth responding to reviews? a case study of the top free apps in the Google Play store","volume":"pp","author":"mcilroy","year":"2015","journal-title":"IEEE Softw"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9375-7"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2961111.2962600"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2804345.2804346"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785892"},{"key":"ref5","article-title":"Mobile app reviews: Google &#x2019;Bouncer&#x2019; now scanning Android Market for malware","author":"albanesius","year":"2012"},{"key":"ref8","article-title":"androguard","year":"2015"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9388-2"},{"key":"ref7","article-title":"Amazon Mechanical Turk","year":"2013"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.4018\/jmhci.2011100104"},{"key":"ref157","article-title":"A survey of app store analysis for software engineering","author":"martin","year":"2016"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.18"},{"key":"ref46","article-title":"Complying with COPPA: Frequently Asked Questions","author":"commission","year":"2015"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2664463"},{"key":"ref48","article-title":"Common software measurement international consortium","year":"2015"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MobileSoft.2015.10"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488407"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568263"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10359-4_19"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187879"},{"key":"ref73","first-page":"431","article-title":"Adrob: Examining the landscape and impact of Android application plagiarism","author":"gibler","year":"2013","journal-title":"Proc 11th Annu Int Conf Mobile Syst Appl Serv"},{"key":"ref72","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/978-3-642-30921-2_17","article-title":"AndroidLeaks: Automatically detecting potential privacy leaks in Android applications on a large scale","author":"gibler","year":"2012","journal-title":"Proc International Conference on Trust and Trustworthy Computing"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.4.12"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2015.13"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2013.170"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.195"},{"key":"ref74","article-title":"Smart launcher 3&#x2014;simple. light. fast","year":"2011"},{"key":"ref75","article-title":"Github","year":"2014"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/MobileSoft.2015.8"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568276"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.4018\/jmhci.2012070102"},{"key":"ref61","first-page":"27","article-title":"Rating decision analysis based on iOS App Store data","volume":"18","author":"eri?","year":"2014","journal-title":"Quality Innovation Prosperity"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA.2015.23"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1007\/978-3-319-26844-6_20","article-title":"Investigating functional and code size measures for mobile applications: A replicated study","author":"ferrucci","year":"2015","journal-title":"Proc 16th Int Conf Product-Focused Softw Process Improvement"},{"key":"ref65","article-title":"App store analysis: Mining app stores for relationships between customer, business and technical characteristics","author":"finkelstein","year":"2014"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA.2015.22"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007465528199"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2488202"},{"key":"ref69","first-page":"582","article-title":"Analysis of user comments: An approach for software requirements evolution","author":"galvis carre\u00f1o","year":"2013","journal-title":"Proc Int Conf Softw Eng"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2012.6181075"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1080\/01969722.2013.803889"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38631-2_14"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2014.79"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2014.81"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2012.6240477"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1145\/2494603.2480308"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/2037373.2037464"},{"key":"ref94","first-page":"120","article-title":"Evaluating cross-platform development approaches for mobile applications","author":"heitk\u00f6tter","year":"2012","journal-title":"Proc 8th Int Conf Web Inf Syst Technol"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1108\/00220410410560582"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2015.7363858"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818038"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2012.6224306"},{"key":"ref192","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MS.2013.142","article-title":"A large scale empirical study on software reuse in mobile apps","volume":"31","author":"ruiz","year":"2014","journal-title":"IEEE Softw"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594390"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.7763\/IJCCE.2014.V3.310"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26285-7_19"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/2541016.2541067"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.60"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557563"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2015.7081842"},{"key":"ref83","first-page":"760","article-title":"What parts of your apps are loved by users?","author":"gu","year":"2015","journal-title":"Proc 30th IEEE\/ACM Int Conf Autom Softw Eng"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.421"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2013.6488439"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.32"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2015.7321214"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.88"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2014.6912257"},{"key":"ref200","first-page":"387","article-title":"Instance-based anomaly method for Android malware detection","author":"sanz","year":"2013","journal-title":"Proc 10th Int Conf Cryptography"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/2414536.2414578"},{"key":"ref100","article-title":"An analysis of the mobile app review landscape: Trends and implications","author":"hoon","year":"2013"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339563"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2015.238"},{"key":"ref204","first-page":"7:1","article-title":"A measurement study of tracking in paid mobile applications","author":"seneviratne","year":"2015","journal-title":"Proc ACM Conf Sec Privacy Wireless Mobile Netw"},{"key":"ref201","article-title":"The UCLAppA repository: A repository of research articles on mobile software engineering and app store analysis","author":"sarro","year":"0"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2015.7320410"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2010.77"},{"key":"ref208","article-title":"Sizing up the global mobile apps market","volume":"659","author":"sharma","year":"2010"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741084"},{"key":"ref206","article-title":"Sizing Android mobile applications","author":"sethumadhavan","year":"2011"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624000"},{"key":"ref210","article-title":"iLearnII; An analysis of the education category of the iTunes App Store","author":"shuler","year":"2012"},{"key":"ref212","article-title":"The effect of informational signals on mobile apps sales ranks across the globe","author":"svedic","year":"2015"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2011.25"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-014-9238-2"},{"key":"ref215","first-page":"283","article-title":"Revisiting prior empirical findings for mobile apps: An empirical case study on the 15 most popular open-source Android apps","author":"syer","year":"2013","journal-title":"Proc Conf Center for Advanced Studies on Collaborative Research"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557400"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1002\/sec.675"},{"key":"ref218","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-30244-2_1","article-title":"Android Market analysis with activation patterns","volume":"94","author":"teufl","year":"2012","journal-title":"Security and Privacy in Mobile Information and Communication Systems"},{"key":"ref219","first-page":"1","article-title":"What are the characteristics of high-rated apps? a case study on free Android applications","author":"tian","year":"2015","journal-title":"31st International Conference on Software Maintenance and Evolution"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-015-1588-0"},{"key":"ref222","first-page":"1","article-title":"Enriching iTunes App Store categories via topic modeling","author":"vakulenko","year":"2014","journal-title":"Proc Int Conf Inf Syst"},{"key":"ref221","article-title":"Androzoo","year":"2016"},{"key":"ref229","article-title":"Virusshare.com","year":"2011"},{"key":"ref228","article-title":"Mining mobile apps reviews to support release planning","author":"villarroel p\u00e9rez","year":"2015"},{"key":"ref227","first-page":"1","article-title":"Taming the Android appstore: Lightweight characterization of Android applications","volume":"abs 1504 6093","author":"vigneri","year":"2015","journal-title":"Computer Research Repository-CORR"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1145\/2591971.2592003"},{"key":"ref225","article-title":"GitHub - nviennot\/playdrone: Google Play Crawler","author":"viennot","year":"2014"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1145\/2414536.2414577"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/IWSM.Mensura.2014.8"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.48"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222310206"},{"key":"ref125","first-page":"3912","article-title":"Product portfolio and mobile apps success: Evidence from App Store market","author":"lee","year":"2011","journal-title":"Proc 17th Americas Conf Inf Syst"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357463"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2360674"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2016.1087823"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.7551\/978-0-262-31050-5-ch028"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2015.2494382"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1145\/2384697.2384698"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2013.6557892"},{"key":"ref232","article-title":"Lifting inter-app data-flow analysis to large app sets","author":"von rhein","year":"2015"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.85"},{"key":"ref230","article-title":"Developer Economics 2013: The tools report","year":"2013"},{"key":"ref231","article-title":"Developer Economics Q1 2015: State of the Developer Nation","year":"2015"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2353996"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2805833"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2015.153"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.101"},{"key":"ref237","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1145\/2771783.2771795","article-title":"WuKong: A scalable and accurate two-phase approach to Android app clone detection","author":"wang","year":"2015","journal-title":"Proc Int'l Symp on Softw Testing and Analysis"},{"key":"ref236","first-page":"1","article-title":"Detecting display energy hotspots in Android apps","author":"wan","year":"2015","journal-title":"Proc IEEE Int'l Conf Software Testing Verification and Validation"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1145\/2600428.2609560"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1145\/2484028.2484035"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491428"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591092"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597085"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597109"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1145\/2684822.2685322"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742668"},{"key":"ref143","first-page":"57","article-title":"Decaf: Detecting and characterizing ad fraud in mobile apps","author":"liu","year":"2014","journal-title":"Proc 10th USENIX Conf Netw Syst Des Implementation"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.582"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud.2014.22"},{"key":"ref1","first-page":"42","article-title":"Mobile game size estimation: Cosmic FSM rules, UML mapping model and unity 3d game engine","author":"abdullah","year":"2014","journal-title":"Proc IEEE Conf Open Syst"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.93"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/NBiS.2014.51"},{"key":"ref242","first-page":"241","article-title":"Understanding the inconsistencies between text descriptions and the use of privacy-sensitive resources of mobile apps","author":"watanabe","year":"2015","journal-title":"Proc Symp Usable Privacy Secur"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2014.23"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1145\/2601248.2601268"},{"key":"ref240","first-page":"226","article-title":"Quantitative security risk assessment of Android permissions and applications","author":"wang","year":"2013","journal-title":"Proc 27th Int Conf Data Appl Secur Privacy XXVII"},{"key":"ref248","article-title":"APPIC: Finding the hidden scene behind description files for Android apps","author":"yang","year":"2014"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.50"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2013.6698893"},{"key":"ref245","first-page":"10:1","article-title":"AppWatcher: Unveiling the underground market of trading mobile app reviews","author":"xie","year":"2015","journal-title":"Proc ACM Conf Sec Privacy Wireless Mobile Netw"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433446"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/2677832.2677842"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381938"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/CGC.2013.95"},{"key":"ref106","first-page":"29:1","article-title":"What are you complaining about?: A study of online reviews of mobile applications","author":"iacob","year":"2013","journal-title":"Proc 27th Int BCS Human Comput Interaction Conf"},{"key":"ref105","first-page":"47","article-title":"Online reviews as first class artifacts in mobile app development","author":"iacob","year":"2014","journal-title":"Proc 5th Int Conf Mobile Comput Appl Services"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624001"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771803"},{"key":"ref102","first-page":"977","article-title":"SUPOR: Precise and scalable sensitive user input detection for Android apps","author":"huang","year":"2015","journal-title":"Proc 24th USENIX Conf Security Symp"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935932"},{"key":"ref112","first-page":"450","article-title":"Detecting inconsistencies in multi-platform mobile apps","author":"joorabchi","year":"2015","journal-title":"Proc IEEE Int Symp Softw Rel Eng"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557549"},{"key":"ref250","first-page":"25","article-title":"Viewdroid: Towards obfuscation-resilient mobile application repackaging detection","author":"zhang","year":"2014","journal-title":"Proc ACM Conf Sec Privacy Wireless Mobile Netw"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813669"},{"key":"ref254","first-page":"23:1","article-title":"Harvesting developer credentials in Android apps","author":"zhou","year":"2015","journal-title":"Proc ACM Conf Sec Privacy Wireless Mobile Netw"},{"key":"ref255","first-page":"1303","article-title":"Popularity modeling for mobile apps: A sequential approach","volume":"45","author":"zhu","year":"2014","journal-title":"IEEE Trans Cybern"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480460"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.113"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2398484"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505547"},{"key":"ref10","first-page":"259","article-title":"FlowDroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps","author":"arzt","year":"2014","journal-title":"Proc ACM SIGPLAN Conf Programming Lang Des Implementation"},{"key":"ref258","doi-asserted-by":"crossref","DOI":"10.1145\/2532515","article-title":"Mining mobile user preferences for personalized context-aware recommendation","volume":"5","author":"zhu","year":"2015","journal-title":"ACM Trans Intell Syst Technol"},{"key":"ref11","first-page":"1","article-title":"The impact of large scale promotions on the sales and ratings of mobile apps: Evidence from Apple's App Store","volume":"abs 1506 6857","author":"askalidis","year":"2015","journal-title":"Computer Research Repository-CORR"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.61"},{"key":"ref14","first-page":"406","article-title":"Empirical analysis of Android apps permissions","author":"awang abu bakar","year":"2013","journal-title":"Proc Int Conf Advanced Comput Sci Appl Technol"},{"key":"ref15","article-title":"Empirical studies of Android API usage: Suggesting related API calls and detecting license violations","author":"azad","year":"2015"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.7763\/LNSE.2013.V1.49"},{"key":"ref118","article-title":"Towards improving the quality of mobile app reviews","volume":"7","author":"khalid","year":"2015","journal-title":"Int J Inf Technol Comput Sci"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866317"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2014.50"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2322867"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814274"},{"key":"ref119","article-title":"A case of mobile app reviews as a crowdsource","volume":"7","author":"khalid","year":"2015","journal-title":"Int J Inf Eng Electron Bus"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2015.29"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/s11002-012-9207-0"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635909"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606749"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808123"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-015-0182-6"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1007\/s11628-013-0184-z"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2015.79"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623705"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2320733"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34129-8_20"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/8038906\/07765038.pdf?arnumber=7765038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,16]],"date-time":"2022-07-16T02:37:12Z","timestamp":1657939032000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7765038\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,1]]},"references-count":262,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tse.2016.2630689","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9,1]]}}}