{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T22:51:35Z","timestamp":1757631095083,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,5]],"date-time":"2021-04-05T00:00:00Z","timestamp":1617580800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,5]]},"DOI":"10.1145\/3460620.3460764","type":"proceedings-article","created":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T10:33:05Z","timestamp":1622802785000},"page":"243-249","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Analysis of Android Applications Permissions"],"prefix":"10.1145","author":[{"given":"Amal","family":"Saif","sequence":"first","affiliation":[{"name":"Princess Sumaya University for Technology, Jordan"}]},{"given":"HAMZEH","family":"AL-KILANI","sequence":"additional","affiliation":[{"name":"Princess Sumaya University for Technology, Jordan"}]},{"given":"MALIK","family":"QASAIMEH","sequence":"additional","affiliation":[{"name":"Jordan University of Science and Technology, Jordan"}]},{"given":"ABDULLAH","family":"AL-REFAI","sequence":"additional","affiliation":[{"name":"Princess Sumaya University for Technology, Jordan"}]}],"member":"320","published-online":{"date-parts":[[2021,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.2174\/2213275912666181214152207"},{"key":"e_1_3_2_1_2_1","unstructured":"Global mobile OS market share (January 2020) https:\/\/www.statista.com\/statistics\/266136\/global-market-share-held-by-smartphone-operating-systems\/"},{"key":"e_1_3_2_1_3_1","unstructured":"Smartphone Security (January 2020) https:\/\/www.kaspersky.com\/resource-center\/threats\/smartphones"},{"key":"e_1_3_2_1_4_1","unstructured":"Fake WhatsApp Application (December 2019) https:\/\/www.independent.co.uk\/life-style\/gadgets-and-tech\/news\/whatsapp-app-android-messaging-apps-fake-google-play-a8039806.html"},{"key":"e_1_3_2_1_5_1","unstructured":"Android vs IOS Market Share (January 2020) https:\/\/leftronic.com\/android-vs-ios-market-share\/"},{"key":"e_1_3_2_1_6_1","volume-title":"International Journal of Applied Engineering Research. 12. 15169-15178.","author":"Binu Karthick","year":"2017","unstructured":"Sowndarajan, Karthick & Binu, Sumitra. (2017). Static Analysis Tool for Identification of Permission Misuse by Android Applications. International Journal of Applied Engineering Research. 12. 15169-15178."},{"key":"e_1_3_2_1_7_1","unstructured":"Lingfeng Bao David Lo Xin Xia and Shanping Li (2016) What Permissions Should This Android App Request"},{"key":"e_1_3_2_1_8_1","unstructured":"Asma Hamed Hella Ayed and Dorra Machfar (2017) A Proactive Approach toward Privacy Risk Assessment for Android Apps Permissions"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"jinxin zhang xiaohui yang Tao Li and Jiamin Bao (2014) A detection system of android application based on permission analysis","DOI":"10.1049\/cp.2014.0730"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Danyang Jiang Xiangling Fu Maoqiang Song and Yidong Cui (2012) A security assessment method for Android applications based on permission model","DOI":"10.1109\/CCIS.2012.6664265"},{"key":"e_1_3_2_1_11_1","volume-title":"Static Analysis Tool for Identification of Permission Misuse by Android Applications","author":"Sowndarajan Karthick","year":"2017","unstructured":"Karthick Sowndarajan and Sumitra Binu (2017) Static Analysis Tool for Identification of Permission Misuse by Android Applications"},{"key":"e_1_3_2_1_12_1","volume-title":"Permission-based Analysis of Android Applications Using Categorization and Deep Learning Scheme","author":"Alimardani Hamidreza","year":"2019","unstructured":"Hamidreza Alimardani and Mohammed Nazeh (2019) Permission-based Analysis of Android Applications Using Categorization and Deep Learning Scheme"},{"key":"e_1_3_2_1_13_1","unstructured":"Introduction to Android Development (January 2020) https:\/\/www.geeksforgeeks.org\/introduction-to-android-development\/"},{"key":"e_1_3_2_1_14_1","unstructured":"App Manifest Overview (January 2020) https:\/\/developer.android.com\/guide\/topics\/manifest\/manifest-intro"},{"key":"e_1_3_2_1_15_1","unstructured":"Android Permissions (January 2020) https:\/\/www.pewresearch.org\/internet\/interactives\/apps-permissions\/"}],"event":{"name":"DATA'21: International Conference on Data Science, E-learning and Information Systems 2021","acronym":"DATA'21","location":"Ma'an Jordan"},"container-title":["International Conference on Data Science, E-learning and Information Systems 2021"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460620.3460764","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460620.3460764","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:32:06Z","timestamp":1757543526000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460620.3460764"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,5]]},"references-count":15,"alternative-id":["10.1145\/3460620.3460764","10.1145\/3460620"],"URL":"https:\/\/doi.org\/10.1145\/3460620.3460764","relation":{},"subject":[],"published":{"date-parts":[[2021,4,5]]},"assertion":[{"value":"2021-06-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}