{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T05:06:34Z","timestamp":1748063194795,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,30]],"date-time":"2022-10-30T00:00:00Z","timestamp":1667088000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,30]],"date-time":"2022-10-30T00:00:00Z","timestamp":1667088000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,30]]},"DOI":"10.1109\/wpmc55625.2022.10014860","type":"proceedings-article","created":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T14:12:29Z","timestamp":1674223949000},"page":"279-284","source":"Crossref","is-referenced-by-count":2,"title":["Security Assessment of Android-Based Mobile Terminals"],"prefix":"10.1109","author":[{"given":"Zhiyuan","family":"Hu","sequence":"first","affiliation":[{"name":"vivo Mobile Communication Co., Ltd."}]},{"given":"Linghang","family":"Shi","sequence":"additional","affiliation":[{"name":"vivo Mobile Communication Co., Ltd."}]},{"given":"Huijun","family":"Chen","sequence":"additional","affiliation":[{"name":"vivo Mobile Communication Co., Ltd."}]},{"given":"Chao","family":"Li","sequence":"additional","affiliation":[{"name":"vivo Mobile Communication Co., Ltd."}]},{"given":"Jinghui","family":"Lu","sequence":"additional","affiliation":[{"name":"vivo Mobile Communication Co., Ltd."}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2017.8070423"},{"key":"ref11","article-title":"Risk Assessment of User-Defined Security Configurations for Android Devices","author":"daniel","year":"0","journal-title":"2016 IEEE 27Th international symposium on software reliability engineering (ISSRE)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2018.8319325"},{"journal-title":"Security Evaluation for Android OS using Expert Systems","year":"2019","author":"raza","key":"ref13"},{"key":"ref14","first-page":"258","article-title":"Security Evaluation of IOS and Android","volume":"4","author":"ahmet","year":"2016","journal-title":"International Journal of Applied Mathematics Electronics and Computers IJAMEC"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/FRUCT.2017.8071306"},{"key":"ref16","first-page":"1","article-title":"Automated Security Assessment Framework for Wearable BLE-enabled Health Monitoring Devices","volume":"22","author":"ghazale","year":"2022","journal-title":"ACM Transactions on Internet Technology"},{"journal-title":"TEE System Architecture Version 1 2","year":"0","author":"technology","key":"ref17"},{"journal-title":"ARM TrustZone for AArch64","year":"0","key":"ref18"},{"journal-title":"The Analytic Hierarchy Process McGraw Hill","year":"1980","author":"saaty","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-02954-y"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30436-1_36"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DSC53577.2021.00102"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2018.8488313"},{"key":"ref8","first-page":"13","article-title":"A Mobile Application for Security Assessment Towards the Internet of Thing Devices","author":"vasaka","year":"2019","journal-title":"2019 IEEE 6th Asian Conference on Defence Technology (ACDT)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MOBISECSERV.2019.8686551"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICODSE.2015.7436972"},{"key":"ref9","article-title":"Information System Audit for Mobile Device Security Assessment","author":"noor","year":"0","journal-title":"Langkawi Island Malaysia"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0256881"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1080\/01446190802071190","article-title":"Decision support method for multi-criteria selection of bridge rehabilitation strategy","volume":"26","author":"saleh","year":"2008","journal-title":"Construction Management and Economics"},{"key":"ref22","first-page":"37","article-title":"A cybersecurity risk assessment","volume":"6","author":"petrova","year":"2021","journal-title":"International Scientific Journals of Scientific Technical Union of Mechanical Engineering"},{"key":"ref21","first-page":"656","article-title":"Information Security Risk Assessment Based on Analytic Hierarchy Process","volume":"1","author":"mingxiang","year":"2016","journal-title":"March 2016 Indonesian Journal of Electrical Engineering and Computer Science"},{"key":"ref24","first-page":"811","article-title":"Healthcare Device Security Assessment through Computational Methodology","volume":"41","author":"ahmad","year":"2021","journal-title":"October 2021 Computer Systems Science and Engineering"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2021.015092"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-S.2019.00008"}],"event":{"name":"2022 25th International Symposium on Wireless Personal Multimedia Communications (WPMC)","start":{"date-parts":[[2022,10,30]]},"location":"Herning, Denmark","end":{"date-parts":[[2022,11,2]]}},"container-title":["2022 25th International Symposium on Wireless Personal Multimedia Communications (WPMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10014682\/10014702\/10014860.pdf?arnumber=10014860","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T16:56:21Z","timestamp":1676912181000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10014860\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,30]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/wpmc55625.2022.10014860","relation":{},"subject":[],"published":{"date-parts":[[2022,10,30]]}}}