{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:31:36Z","timestamp":1725769896144},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,4]]},"DOI":"10.1109\/icdew.2012.81","type":"proceedings-article","created":{"date-parts":[[2012,10,9]],"date-time":"2012-10-09T18:14:56Z","timestamp":1349806496000},"page":"251-254","source":"Crossref","is-referenced-by-count":24,"title":["Malicious Android Applications in the Enterprise: What Do They Do and How Do We Fix It?"],"prefix":"10.1109","author":[{"given":"Xuetao","family":"Wei","sequence":"first","affiliation":[]},{"given":"Lorenzo","family":"Gomez","sequence":"additional","affiliation":[]},{"given":"Iulian","family":"Neamtiu","sequence":"additional","affiliation":[]},{"given":"Michalis","family":"Faloutsos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Massive Security Vulnerability in HTC Android Devices","year":"2011","key":"3"},{"journal-title":"Popular Android Apps Pose Security Risks for Users","year":"2011","key":"2"},{"key":"1","article-title":"Google pulls more malware-infected apps from android market","author":"albanesius","year":"2011","journal-title":"PC Magazine"},{"journal-title":"A Characterization of Malicious Android Applications","year":"2011","author":"gomez","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"5","article-title":"Permission re- delegation: Attacks and defenses","author":"felt","year":"2011","journal-title":"USENIX Security Symposium"},{"journal-title":"Number of New Applications in Android Market by Month","year":"2011","key":"4"},{"key":"9","article-title":"Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones","author":"enck","year":"2010","journal-title":"OSDI"},{"key":"8","article-title":"Defending users against smartphone apps: Techniques and future directions","author":"enck","year":"2011","journal-title":"ICISS"}],"event":{"name":"2012 IEEE International Conference on Data Engineering Workshops (ICDEW)","start":{"date-parts":[[2012,4,1]]},"location":"Arlington, VA, USA","end":{"date-parts":[[2012,4,5]]}},"container-title":["2012 IEEE 28th International Conference on Data Engineering Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6313629\/6313630\/06313688.pdf?arnumber=6313688","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T18:28:01Z","timestamp":1490120881000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6313688\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/icdew.2012.81","relation":{},"subject":[],"published":{"date-parts":[[2012,4]]}}}