{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:17:07Z","timestamp":1760145427006,"version":"build-2065373602"},"reference-count":74,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2024,7,13]],"date-time":"2024-07-13T00:00:00Z","timestamp":1720828800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Software"],"abstract":"<jats:p>The number of mobile applications (\u201cApps\u201d) has grown significantly in recent years. App Stores rank\/recommend Apps based on factors such as average star ratings and the number of installs. Such rankings do not focus on the internal artifacts of Apps (e.g., security vulnerabilities). If internal artifacts are ignored, users may fail to estimate the potential risks associated with installing Apps. In this research, we present a framework called E-SERS (Enhanced Security-related and Evidence-based Ranking Scheme) for comparing Android Apps that offer similar functionalities. E-SERS uses internal and external artifacts of Apps in the ranking process. E-SERS is a significant enhancement of our past evidence-based ranking framework called SERS. We have evaluated E-SERS on publicly accessible Apps from the Google Play Store and compared our rankings with prevalent ranking techniques. Our experiments demonstrate that E-SERS, leveraging its holistic approach, excels in identifying malicious Apps and consistently outperforms existing alternatives in ranking accuracy. By emphasizing comprehensive assessment, E-SERS empowers users, particularly those less experienced with technology, to make informed decisions and avoid potentially harmful Apps. This contribution addresses a critical gap in current App-ranking methodologies, enhancing the safety and security of today\u2019s technologically dependent society.<\/jats:p>","DOI":"10.3390\/software3030013","type":"journal-article","created":{"date-parts":[[2024,7,16]],"date-time":"2024-07-16T11:31:57Z","timestamp":1721129517000},"page":"250-270","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["E-SERS: An Enhanced Approach to Trust-Based Ranking of Apps"],"prefix":"10.3390","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0992-1052","authenticated-orcid":false,"given":"Nahida","family":"Chowdhury","sequence":"first","affiliation":[{"name":"Department of Computer and Information Science, Indiana University\u2014Purdue University Indianapolis IUPUI, Indianapolis, IN 46202, USA"}]},{"given":"Ayush","family":"Maharjan","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, Indiana University\u2014Purdue University Indianapolis IUPUI, Indianapolis, IN 46202, USA"}]},{"given":"Rajeev R.","family":"Raje","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, Indiana University\u2014Purdue University Indianapolis IUPUI, Indianapolis, IN 46202, USA"}]}],"member":"1968","published-online":{"date-parts":[[2024,7,13]]},"reference":[{"key":"ref_1","unstructured":"(2021, March 04). How Rating Affects Ranking in Search Results and Top Charts across Platforms. Available online: https:\/\/www.adweek.com\/digital\/how-rating-affects-ranking-in-search-results-and-top-charts-across-platforms\/."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Harman, M., Jia, Y., and Zhang, Y. (2012, January 2\u20133). App store mining and analysis: MSR for app stores. Proceedings of the 9th IEEE Working Conference on Mining Software Repositories, Zurich, Switzerland.","DOI":"10.1109\/MSR.2012.6224306"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Pagano, D., and Maalej, W. (2013, January 15\u201319). User Feedback in the AppStore: An Empirical Study. Proceedings of the 21st IEEE International Requirements Engineering Conference, Rio de Janeiro, Brazil.","DOI":"10.1109\/RE.2013.6636712"},{"key":"ref_4","unstructured":"Svedic, Z. (2015). The Effect of Informational Signals on Mobile Apps Sales Ranks across the Globe. [Ph.D. Thesis, Simon Fraser University]."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"817","DOI":"10.1109\/TSE.2016.2630689","article-title":"A Survey of App Store Analysis for Software Engineering","volume":"43","author":"Martin","year":"2016","journal-title":"IEEE Trans. Softw. Eng."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/j.infsof.2017.03.002","article-title":"Investigating the relationship between price, rating, and popularity in the Blackberry World App Store","volume":"87","author":"Finkelstein","year":"2017","journal-title":"Inf. Softw. Technol."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/TSE.2014.2360674","article-title":"Investigating Country Differences in Mobile App User Behavior and Challenges for Software Engineering","volume":"41","author":"Lim","year":"2014","journal-title":"IEEE Trans. Softw. Eng."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"3316","DOI":"10.1007\/s10664-019-09706-9","article-title":"Towards understanding and detecting fake reviews in app stores","volume":"24","author":"Martens","year":"2019","journal-title":"Empir. Softw. Eng."},{"key":"ref_9","unstructured":"Siegler, M. (2009). YouTube Comes To A 5-Star Realization: Its Ratings Are Useless. Techcrunch, Available online: https:\/\/techcrunch.com\/2009\/09\/22\/youtube-comes-to-a-5-star-realization-its-ratings-are-useless\/."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Chowdhury, N.S., and Raje, R.R. (2017, January 22\u201324). Disparity between the Programmatic Views and the User Perceptions of Mobile Apps. Proceedings of the 20th International Conference of Computer and Information Technology, Dhaka, Bangladesh.","DOI":"10.1109\/ICCITECHN.2017.8281774"},{"key":"ref_11","unstructured":"Dellinger, A. (2021, March 04). Many Popular Android Apps Leak Sensitive Data, Leaving Millions of Consumers at Risk, Technical Report Forbes. Available online: https:\/\/www.forbes.com\/sites\/ajdellinger\/2019\/06\/07\/many-popular-android-apps-leak-sensitive-data-leaving-millions-of-consumers-at-risk\/#7bc629d0521e."},{"key":"ref_12","unstructured":"(2021, March 04). Doevan, Android Virus, The List of Infected Apps for 2019, 2-Spyware. Available online: https:\/\/www.2-spyware.com\/remove-android-virus.html."},{"key":"ref_13","unstructured":"Venkat, A. (2021, March 04). Kaspersky: Malware Found Hiding in Popular Android App, Bankinfosecurity. Available online: https:\/\/www.bankinfosecurity.com\/kaspersky-malware-found-hiding-in-popular-android-app-a-13008."},{"key":"ref_14","unstructured":"Kan, M. (2021, March 04). Malware Discovered in Popular Android App Cam-Scanner, PCMag. Available online: https:\/\/www.pcmag.com\/news\/malware-discovered-in-popular-android-app-camscanner."},{"key":"ref_15","unstructured":"Liam, T. (2021, March 04). Android Google Play App with 100 Million Downloads Starts to Deliver Malware, ZDNet. Available online: https:\/\/www.zdnet.com\/article\/android-google-play-app-with-100-million-downloads-starts-to-deliver-malware\/."},{"key":"ref_16","unstructured":"Doffman, Z. (2021, March 04). Android Warning: Devious Malware Found Inside 34 Apps Already Installed by 100M+ Users, Forbes. Available online: https:\/\/www.forbes.com\/sites\/zakdoffman\/2019\/08\/13\/android-users-have-installed-dangerous-new-malware-from-google-play\/5c7ed4cd22a9."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Chowdhury, N., and Raje, R. (2018, January 21\u201323). A Holistic Ranking Scheme for Apps. Proceedings of the 21st International Conference of Computer and Information Technology, Dhaka, Bangladesh.","DOI":"10.1109\/ICCITECHN.2018.8631955"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Chowdhury, N., and Raje, R. (2019, January 12\u201314). SERS: A Security-related and Evidence-based Ranking Scheme for Mobile Apps. Proceedings of the the First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, Los Angeles, CA, USA.","DOI":"10.1109\/TPS-ISA48467.2019.00024"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Shafer, G. (1976). A Mathematical Theory of Evidence, White-Paper, Princeton University Press.","DOI":"10.1515\/9780691214696"},{"key":"ref_20","unstructured":"J\u00f8sang, A., Hayward, R., and Pope, S. (2006, January 16\u201319). Trust network analysis with subjective logic. Proceedings of the 29th Australasian Computer Science Conference, Hobart, TAS, Australia."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1142\/S0218488501000831","article-title":"A Logic for Uncertain Probabilities","volume":"9","author":"Hayward","year":"2001","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Zhuang, L., Jing, F., and Zhu, X. (2006, January 6\u201311). Movie review mining and summarization. Proceedings of the 15th ACM International Conference on Information and Knowledge Management, Arlington, VA, USA.","DOI":"10.1145\/1183614.1183625"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"10760","DOI":"10.1016\/j.eswa.2009.02.063","article-title":"A survey on sentiment detection of reviews","volume":"36","author":"Tang","year":"2009","journal-title":"Expert Syst. Appl."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/1500000011","article-title":"Opinion Mining and Sentiment Analysis","volume":"2","author":"Pang","year":"2008","journal-title":"Found. Trends Inf. Retr."},{"key":"ref_25","unstructured":"Panichella, S., Sorboy, A., Guzmanz, E., Visaggioy, C., Canforay, G., and Gall, H. (October, January 29). How Can I Improve My App? Classifying User Reviews for Software Maintenance and Evolution. Proceedings of the International Conference on Software Maintenance and Evolution, Bremen, Germany."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Pang, B., Lee, L., and Vaithyanathan, S. (2002, January 6). ThumbsUp? Sentiment Classification using Machine Learning Techniques. Proceedings of the Empirical Methods in Natural Language Processing.","DOI":"10.3115\/1118693.1118704"},{"key":"ref_27","first-page":"153","article-title":"Sentiment Analysis of App Store Reviews","volume":"4","author":"Sangani","year":"2013","journal-title":"Methodology"},{"key":"ref_28","unstructured":"Palomba, F., Linares-V\u00e1squez, M., Bavota, G., Oliveto, R., Di Penta, M., Poshyvanyk, D., and De Lucia, A. (October, January 29). User Reviews Matter! Tracking Crowdscourced Reviews to Support Evolution of Successful Apps. Proceedings of the International Conference on Software Maintenance and Evolution, Bremen, Germany."},{"key":"ref_29","unstructured":"Gallege, L. (2016). Trust-Based Service Selection and Recommendation for Online Software Marketplaces (TruSStReMark). [Ph.D. Thesis, Purdue University]."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Gallege, L., and Raje, R. (2017, January 4\u20136). Parallel Methods for Evidence and Trust-Based Selection and Recommendation of Software Apps from Online Marketplaces. Proceedings of the 12th Annual Cyber and Information Security Research Conference, Oak Ridge, TN, USA.","DOI":"10.1145\/3064814.3064819"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Sarma, B.P., Li, N., Gates, C., Potharaju, R., Nita-Rotaru, C., and Molloy, I. (2012, January 20\u201322). Android permissions: A perspective combining risks and benefits. Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, Newark, NJ, USA.","DOI":"10.1145\/2295136.2295141"},{"key":"ref_32","first-page":"50","article-title":"Hey, you, get off of my market: Detecting malicious Apps in official and alternative android markets","volume":"25","author":"Zhou","year":"2012","journal-title":"NDSS"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Wang, Y., Zheng, J., Sun, C., and Mukkamala, S. (2013, January 15\u201317). Quantitative Security Risk Assessment of Android Permissions and Applications. Proceedings of the 27th Data and Applications Security and Privacy, Newark, NJ, USA.","DOI":"10.1007\/978-3-642-39256-6_15"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1109\/TDSC.2014.2302293","article-title":"Generating summary risk scores for mobile applications","volume":"11","author":"Gates","year":"2014","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Acar, Y., Backes, M., Bugiel, S., Fahl, S., McDaniel, P., and Smith, M. (2016, January 22\u201326). SoK: Lessons Learned from Android Security Research for Applied Software Platforms. Proceedings of the 2016 IEEE Symposium on Security and Privacy, San Jose, CA, USA.","DOI":"10.1109\/SP.2016.33"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Mirzaei, O., Suarez-Tangil, G., and Fuentes, J. (2017, January 2\u20136). TriFlow: Triaging Android Applications Using Speculative Information Flows. Proceedings of the ACM Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates.","DOI":"10.1145\/3052973.3053001"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Arzt, S., Rasthofer, S., Bodden, C.F.E., Bartel, A., Klein, J., Traon, Y., Octeau, D., and McDaniel, P. (2014, January 9\u201311). FlowDroid: Precise Context, Flow, Field, Object-Sensitive and Lifecycle-Aware Taint Analysis for Android Apps. Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, Edinburgh, UK.","DOI":"10.1145\/2594291.2594299"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2619091","article-title":"Taintdroid: An information-flow tracking system for real time privacy monitoring on smart phones","volume":"32","author":"Enck","year":"2014","journal-title":"ACM Trans. Comput. Syst."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Gibler, C., Crussell, J., Erickson, J., and Chen, H. (2012, January 13\u201315). AndroidLeaks: Automatically detecting potential privacy leaks in android applications on a large scale. Proceedings of the International Conference on Trust and Trustworthy Computing, Vienna, Austria.","DOI":"10.1007\/978-3-642-30921-2_17"},{"key":"ref_40","first-page":"110","article-title":"Information flow analysis of android applications in DroidSafe","volume":"15","author":"Gordon","year":"2015","journal-title":"NDSS"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Cheng, X., Luo, Y., and Gui, Q. (2018, January 12\u201314). Research on Trust Management Model of Wireless Sensor Networks. Proceedings of the IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference, Chongqing, China.","DOI":"10.1109\/IAEAC.2018.8577648"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"62095","DOI":"10.1109\/ACCESS.2019.2916340","article-title":"Robust Trust\u2014APro-Privacy Robust Distributed Trust Management Mechanism for Internet of Things","volume":"7","author":"Awan","year":"2019","journal-title":"IEEE Access"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3015771","article-title":"Measurement Theory-Based Trust Management Framework for Online Social Communities","volume":"17","author":"Ruan","year":"2017","journal-title":"ACM Trans. Internet Technol."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1016\/S1567-4223(03)00039-5","article-title":"I-TRUST: Investigating trust between users and agents in a multi-agent portfolio management system, Electronic Commerce Research and Applications","volume":"2","author":"Tang","year":"2003","journal-title":"Electron. Commer. Res. Appl."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Tang, J., Hu, X., Chang, Y., and Liu, H. (2014, January 3\u20137). Predictability of Distrust with Interaction Data. Proceedings of the 23rd ACM International Conference on Information and Knowledge Management, Shanghai, China.","DOI":"10.1145\/2661829.2661988"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1002\/cpe.3656","article-title":"Understanding the trust of software-intensive distributed systems","volume":"28","author":"Gallege","year":"2015","journal-title":"Concurr. Comput. Pr. Exp."},{"key":"ref_47","unstructured":"J\u00f8sang, A. (, January December). Artificial Reasoning with Subjective Logic. Proceedings of the Second Australian Workshop on Commonsense Reasoning, Perth, Australia. Available online: https:\/\/folk.universitetetioslo.no\/josang\/papers\/Jos1997-AWCR.pdf."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Hernandez, N., Recabarren, R., Carbunar, B., and Ahmed, S.I. (2021, January 2\u20134). RacketStore: Measurements of ASO deception in Google play via mobile and app usage. Proceedings of the 21st ACM Internet Measurement Conference, Virtual Event.","DOI":"10.1145\/3487552.3487837"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Farooqi, S., Feal, \u00c1., Lauinger, T., McCoy, D., Shafiq, Z., and Vallina-Rodriguez, N. (2020, January 27\u201329). Understanding Incentivized Mobile App Installs on Google Play Store. Proceedings of the ACM Internet Measurement Conference, Virtual Event.","DOI":"10.1145\/3419394.3423662"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Zhu, H., Xiong, H., Ge, Y., and Chen, E. (2014, January 24\u201327). Mobile App Recommendations with Security and Privacy Awareness. Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, NY, USA.","DOI":"10.1145\/2623330.2623705"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Cen, L., Kong, D., Jin, H., and Si, L. (May, January 30). Mobile App Security Risk Assessment: A Crowdsourcing Ranking Approach. Proceedings of the 2015 SIAM International Conference on Data Mining, Vancouver, BC, Canada.","DOI":"10.1137\/1.9781611974010.74"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.ijar.2004.03.003","article-title":"Multiplication and co-multiplication of beliefs","volume":"38","author":"McAnally","year":"2005","journal-title":"Int. J. Approx. Reason."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1007\/s11859-011-0766-3","article-title":"Using new fusion operations to improve trust expressiveness of subjective logic","volume":"16","author":"Zhou","year":"2011","journal-title":"Wuhan Univ. J. Nat. Sci."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1007\/s10207-015-0298-5","article-title":"Flow-based reputation with uncertainty: Evidence-Based Subjective Logic","volume":"15","author":"Skoric","year":"2016","journal-title":"Int. J. Inf. Secur."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Avdiienko, V., Kuznetsov, K., Gorla, A., Zeller, A., Arzt, S., Rasthofer, S., and Bodden, E. (2015, January 16\u201324). Mining Apps for Abnormal Usage of Sensitive Data. Proceedings of the IEEE\/ACM 37th IEEE International Conference on Software Engineering, Florence, Italy.","DOI":"10.1109\/ICSE.2015.61"},{"key":"ref_56","unstructured":"Arzt, S., Rasthofer, S., and Bodden, E. (2013). SuSi: A Tool for the Fully Automated Classification and Categorization of Android Sources and Sinks, Technische Universit\u00e4t Darmstadt & Fraunhofer SIT. Technical Report."},{"key":"ref_57","first-page":"800","article-title":"Risk management guide for information technology systems","volume":"800","author":"Stoneburner","year":"2002","journal-title":"Natl. Inst. Stand. Technol. (NIST)"},{"key":"ref_58","unstructured":"Joh, H., and Malaiya, Y. (2011, January 18\u201321). Defining and assessing quantitative security risk measures using vulnerability lifecycle and cvss metrics. Proceedings of the 2011 International Conference on Security and Management, Las Vegas, NV, USA."},{"key":"ref_59","unstructured":"(2021, March 06). Android, Android Permissions Overview. Available online: https:\/\/developer.android.com\/guide\/topics\/permissions\/overview."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Au, K., Zhou, Y., Huang, Z., and Lie, D. (2012, January 16\u201318). PScout: Analyzing the Android Permission Specification. Proceedings of the ACM Conference on Computer and Communications Security, Raleigh, NC, USA.","DOI":"10.1145\/2382196.2382222"},{"key":"ref_61","unstructured":"(2021, March 06). DroidBench\u2014Benchmarks. Available online: https:\/\/blogs.unipaderborn.de\/sse\/tools\/droidbench\/."},{"key":"ref_62","unstructured":"Shung, K. (2021, March 06). Accuracy, Precision, Recall or F1? Towards Data Science. Available online: https:\/\/towardsdatascience.com\/accuracy-precision-recall-or-f1331fb37c5cb9."},{"key":"ref_63","unstructured":"Brian, R. (2021, March 07). Test of 250 Popular Android Mobile Apps Reveals That 70% Leak Sensitive Personal Data; Technical Report; NowSecure: 2019. Available online: https:\/\/www.nowsecure.com\/blog\/2019\/06\/06\/test-of-250-popular-android-mobile-apps-reveal-that-70-leak-sensitive-personal-data\/."},{"key":"ref_64","unstructured":"(2021, March 06). Unicodedata. Available online: https:\/\/docs.python.org\/2\/library\/unicodedata.html."},{"key":"ref_65","unstructured":"(2021, March 06). The IBM Watson Natural Language Understanding. Available online: https:\/\/cloud.ibm.com\/docs\/services\/natural-languageunderstanding?topic=natural-language-understanding-getting-started."},{"key":"ref_66","unstructured":"(2021, March 06). Krishni, A Beginners Guide to Random Forest Regression, Medium. Available online: https:\/\/medium.com\/datadriveninvestor\/random-forest-regression-871bc9a25eb."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Jindal, N., and Liu, B. (2007, January 28\u201331). Analyzing and Detecting Review Spam. Proceedings of the Seventh IEEE International Conference on Data Mining, Omaha, NE, USA.","DOI":"10.1109\/ICDM.2007.68"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"e3","DOI":"10.4108\/eai.8-4-2019.157415","article-title":"A Machine Learning Based Approach for Mobile App Rating Manipulation Detection","volume":"5","author":"Song","year":"2019","journal-title":"ICST Trans. Secur. Saf."},{"key":"ref_69","unstructured":"MacKay, D. (2003). Information Theory, Inference and Learning Algorithms, Cambridge University Press."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1093\/biomet\/58.1.83","article-title":"Spectra of some self-exciting and mutually exciting point processes","volume":"58","author":"Hawkes","year":"1971","journal-title":"Biometrika"},{"key":"ref_71","unstructured":"Johnson, D. (2008). Using Weights in the Analysis of Survey Data, Population Research Institute, The Pennsylvania State University."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1093\/biomet\/30.1-2.81","article-title":"A New Measure of Rank Correlation","volume":"30","author":"Kendall","year":"1938","journal-title":"Biometrika"},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Maalej, W., and Nabil, H. (2015, January 24\u201328). Bug report, feature request, or simply praise? On automatically classifying app reviews. Proceedings of the 2015 IEEE 23rd International Requirements Engineering Conference (RE), Ottawa, ON, Canada.","DOI":"10.1109\/RE.2015.7320414"},{"key":"ref_74","unstructured":"(2021, March 07). App Radar, App Ranking Factors How to Improve App Store Search Rankings. Available online: https:\/\/appradar.com\/academy\/bonus-chapters\/appstore-ranking-factors\/."}],"container-title":["Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2674-113X\/3\/3\/13\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T15:16:30Z","timestamp":1760109390000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2674-113X\/3\/3\/13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,13]]},"references-count":74,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["software3030013"],"URL":"https:\/\/doi.org\/10.3390\/software3030013","relation":{},"ISSN":["2674-113X"],"issn-type":[{"type":"electronic","value":"2674-113X"}],"subject":[],"published":{"date-parts":[[2024,7,13]]}}}