{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:51:47Z","timestamp":1725771107085},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/uemcon.2016.7777821","type":"proceedings-article","created":{"date-parts":[[2016,12,13]],"date-time":"2016-12-13T01:35:39Z","timestamp":1481592939000},"page":"1-7","source":"Crossref","is-referenced-by-count":6,"title":["A hybrid analysis for mobile security threat detection"],"prefix":"10.1109","author":[{"given":"Yong","family":"Shi","sequence":"first","affiliation":[]},{"given":"Wanqing","family":"You","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Prabir","family":"Bhattacharya","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Qian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"SCanDroid: Automated Security Certification of Android Applications","author":"fuchs","year":"2009","journal-title":"Technical Report CS-TR-4991 Department of Computer Science University of Maryland"},{"journal-title":"Apposcopy Semantics-Based Detection of Android Malware through Static Analysis","year":"0","author":"feng","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590313"},{"year":"0","key":"ref13"},{"year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2014.8.1.22"},{"year":"0","key":"ref16"},{"journal-title":"Static Analysis Techniques Used in Android Application Security Analysis","year":"0","author":"schmeelk","key":"ref4"},{"journal-title":"Q2 IT evolution threat report","year":"0","key":"ref3"},{"key":"ref6","article-title":"A study of android application security","author":"enck","year":"2011","journal-title":"USENIX Security Symposium"},{"key":"ref5","first-page":"393","article-title":"TaintDroid: An information-flow tracking system for real-time privacy monitoring on smartphones","author":"enck","year":"2010","journal-title":"OSDI"},{"key":"ref8","article-title":"Highly precise taint analysis for android application","author":"fritz","year":"2013","journal-title":"Technical report EC SPRIDE Technical Report"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"year":"0","key":"ref2"},{"year":"0","key":"ref1"},{"year":"0","key":"ref9"}],"event":{"name":"2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","start":{"date-parts":[[2016,10,20]]},"location":"New York City, NY, USA","end":{"date-parts":[[2016,10,22]]}},"container-title":["2016 IEEE 7th Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7763653\/7777798\/07777821.pdf?arnumber=7777821","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,1,5]],"date-time":"2017-01-05T13:46:40Z","timestamp":1483624000000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7777821\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/uemcon.2016.7777821","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}