{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T14:09:09Z","timestamp":1746194949191},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/uemcon.2016.7777883","type":"proceedings-article","created":{"date-parts":[[2016,12,13]],"date-time":"2016-12-13T01:35:39Z","timestamp":1481592939000},"source":"Crossref","is-referenced-by-count":5,"title":["On the evolution of mobile computing software systems and C\/C++ vulnerable code: Empirical investigation"],"prefix":"10.1109","author":[{"given":"Saleh M.","family":"Alnaeli","sequence":"first","affiliation":[]},{"given":"Melissa","family":"Sarnowski","sequence":"additional","affiliation":[]},{"given":"Md Sayedul","family":"Aman","sequence":"additional","affiliation":[]},{"given":"Kumar","family":"Yelamarthi","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Abdelgawad","sequence":"additional","affiliation":[]},{"given":"Haowen","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"vadalasetty","year":"0","journal-title":"Security Concerns in Using Open Source Software for Enterprise Requirements"},{"key":"ref11","first-page":"106","article-title":"An insight into the security issues and their solutions for android phones","author":"khandelwal","year":"2015","journal-title":"Computing for Sustainable Global Development (INDIACom) 2015 2nd International Conference on"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/BIGCOMP.2016.7425809"},{"key":"ref13","author":"howard","year":"0","journal-title":"Security Development Lifecycle (SDL) Banned Function Calls [Online]"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2011.19"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SERA.2016.7516139"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2016.7535325"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SERE-C.2012.16"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/EURCON.2003.1248124"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EC2ND.2010.14"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2000.898880"},{"key":"ref8","first-page":"189","article-title":"A case study in open source software security and privacy: Android adware","author":"erturk","year":"2012","journal-title":"Internet Security (WorldCIS) 2012 World Congress on"},{"key":"ref7","author":"sahu","year":"2016","journal-title":"The Linux GNU C Library Vulnerability What It Is How To Fix It"},{"key":"ref2","first-page":"1.","article-title":"The Use of Security Tactics in Open Source Software Projects","author":"ryoo","year":"2015","journal-title":"IEEE Transactions on Reliability"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.09.003"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CEWIT.2015.7338170"}],"event":{"name":"2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","location":"New York City, NY, USA","start":{"date-parts":[[2016,10,20]]},"end":{"date-parts":[[2016,10,22]]}},"container-title":["2016 IEEE 7th Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7763653\/7777798\/07777883.pdf?arnumber=7777883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,1,5]],"date-time":"2017-01-05T13:38:36Z","timestamp":1483623516000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7777883\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/uemcon.2016.7777883","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}