{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T14:02:48Z","timestamp":1722780168785},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"National Centers of Academic Excellence in Cybersecurity"},{"DOI":"10.13039\/100009226","name":"National Security Agency","doi-asserted-by":"publisher","award":["H98230-22-1-0256"],"id":[{"id":"10.13039\/100009226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3373202","type":"journal-article","created":{"date-parts":[[2024,3,4]],"date-time":"2024-03-04T19:18:47Z","timestamp":1709579927000},"page":"37586-37599","source":"Crossref","is-referenced-by-count":1,"title":["On Identification of Intrusive Applications: A Step Toward Heuristics-Based Adaptive Security Policy"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-3876-5781","authenticated-orcid":false,"given":"Fadi","family":"Mohsen","sequence":"first","affiliation":[{"name":"Bernoulli Institute for Mathematics, Computer Science and Artificial Intelligence, University of Groningen, Groningen, The Netherlands"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3667-4974","authenticated-orcid":false,"given":"Usman","family":"Rauf","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Mercy University, Dobbs Ferry, NY, USA"}]},{"given":"Victor","family":"Lavric","sequence":"additional","affiliation":[{"name":"Bernoulli Institute for Mathematics, Computer Science and Artificial Intelligence, University of Groningen, Groningen, The Netherlands"}]},{"given":"Alexander","family":"Kokushkin","sequence":"additional","affiliation":[{"name":"Bernoulli Institute for Mathematics, Computer Science and Artificial Intelligence, University of Groningen, Groningen, The Netherlands"}]},{"ORCID":"http:\/\/orcid.org\/0009-0007-1479-6408","authenticated-orcid":false,"given":"Zhiyuan","family":"Wei","sequence":"additional","affiliation":[{"name":"Rocky Mountain Robotech, Broomfield, CO, USA"}]},{"ORCID":"http:\/\/orcid.org\/0009-0001-6607-8121","authenticated-orcid":false,"given":"Adalynn","family":"Martinez","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Mercy University, Dobbs Ferry, NY, USA"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"20 Android Statistics in 2023 (Market Share&Users)","author":"Ruby","year":"2023"},{"key":"ref2","volume-title":"Android Studio","year":"2024"},{"key":"ref3","volume-title":"Number of Available Applications in the Google Play Store From December 2009 to March 2023","year":"2009"},{"key":"ref4","volume-title":"As Mobile Usage Skyrockets, Nearly Half of Consumers Do Not Protect Personal Data","author":"Dolezal","year":"2021"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2013.6529497"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"ref7","first-page":"45","article-title":"An investigation into Android run-time permissions from the end users\u2019 perspective","volume-title":"Proc. IEEE\/ACM 5th Int. Conf. Mobile Softw. Eng. Syst. (MOBILESoft)","author":"Scoccia"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DSA.2018.00014"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62974-8_13"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00147"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2994459.2994474"},{"key":"ref12","first-page":"63","article-title":"On a (Per)mission: Building privacy into the app marketplace","volume-title":"Proc. 6th Workshop Secur. Privacy Smartphones Mobile Devices","author":"Quay-de la Vallee"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2767019"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6571"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICICS.2015.7459926"},{"key":"ref16","article-title":"Assessing mobile application privacy: A quantitative framework for privacy measurement","author":"Marono","year":"2023","journal-title":"arXiv:2311.00066"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MOBILESoft.2017.14"},{"key":"ref18","volume-title":"Average Annual Growth Rate (AAGR)","author":"Chen","year":"2021"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WorldS450073.2020.9210414"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.1225"},{"key":"ref21","volume-title":"Play Store Data Safety: Data Types","year":"2023"},{"key":"ref22","volume-title":"Average Annual Growth Rate (AAGR)","author":"Hayes","year":"2021"},{"key":"ref23","volume-title":"Firebase: Google\u2019s Mobile and Web App Development Platform","year":"2024"},{"key":"ref24","volume-title":"Heroku: Cloud Application Platform","year":"2023"},{"key":"ref25","volume-title":"Structure Your Database","year":"2024"},{"key":"ref26","volume-title":"AAPKS"},{"key":"ref27","volume-title":"Android Developers","year":"2024"},{"key":"ref28","volume-title":"Jsoup: Java Html Parser","author":"Hedley","year":"2009"},{"key":"ref29","volume-title":"Background Execution Limits","year":"2023"},{"key":"ref30","article-title":"Early detection of violating mobile apps: A data-driven predictive model approach","volume":"4","author":"Mohsen","year":"2022","journal-title":"Syst. Soft Comput."},{"key":"ref31","volume-title":"Malware Hits Millions of Android Users\u2014Delete These Apps Right Now","author":"Spadafora","year":"2022"},{"key":"ref32","volume-title":"36 Malicious Android Apps Found on Google Play, Did You Install Them?","author":"Humphries","year":"2022"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10459009.pdf?arnumber=10459009","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T12:58:28Z","timestamp":1711457908000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10459009\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3373202","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}