{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:18:17Z","timestamp":1759133897194},"reference-count":0,"publisher":"KSI Research Inc. and Knowledge Systems Institute Graduate School","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7,1]]},"DOI":"10.18293\/seke2015-162","type":"proceedings-article","created":{"date-parts":[[2015,8,6]],"date-time":"2015-08-06T09:29:04Z","timestamp":1438853344000},"page":"375-378","source":"Crossref","is-referenced-by-count":2,"title":["DefDroid: Securing Android with Fine-Grained Security Policy"],"prefix":"10.18293","volume":"2015","author":[{"given":"Chao","family":"Huang","sequence":"first","affiliation":[]},{"given":"Shuohong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Haiyang","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Zhengwei","family":"Qi","sequence":"additional","affiliation":[]}],"member":"7672","published-online":{"date-parts":[[2015,7,1]]},"event":{"name":"The 27th International Conference on Software Engineering and Knowledge Engineering","acronym":"SEKE2015"},"container-title":["International Conferences on Software Engineering and Knowledge Engineering","Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering"],"original-title":[],"deposited":{"date-parts":[[2015,8,31]],"date-time":"2015-08-31T21:46:22Z","timestamp":1441057582000},"score":1,"resource":{"primary":{"URL":"http:\/\/ksiresearchorg.ipage.com\/seke\/seke15paper\/seke15paper_162.pdf"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,1]]},"references-count":0,"URL":"https:\/\/doi.org\/10.18293\/seke2015-162","relation":{},"ISSN":["2325-9000"],"issn-type":[{"type":"print","value":"2325-9000"}],"subject":[],"published":{"date-parts":[[2015,7,1]]}}}