{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:21:18Z","timestamp":1730276478030,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/issa.2013.6641049","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T19:20:04Z","timestamp":1383074404000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Toward risk-driven security measurement for Android smartphone platforms"],"prefix":"10.1109","author":[{"given":"Reijo M.","family":"Savola","sequence":"first","affiliation":[]},{"given":"Teemu","family":"Vaisanen","sequence":"additional","affiliation":[]},{"given":"Antti","family":"Evesti","sequence":"additional","affiliation":[]},{"given":"Pekka","family":"Savolainen","sequence":"additional","affiliation":[]},{"given":"Juha","family":"Kemppainen","sequence":"additional","affiliation":[]},{"given":"Marko","family":"Kokemaki","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Android os security: Risks and limitations-A practical evaluation","author":"fedler","year":"2012","journal-title":"Fraunhofer AISEC Technical Report"},{"key":"17","first-page":"358","article-title":"Development of measurable security for a distributed messaging system","volume":"2","author":"savola","year":"2009","journal-title":"International Journal on Advances in Security"},{"key":"18","first-page":"522","article-title":"Towards a framework for security measurement","author":"wang","year":"1997","journal-title":"Proceedings of 20th National Information Systems Security Conference"},{"year":"2003","author":"gray","journal-title":"TETRA Advocate's Handbook","key":"15"},{"year":"2011","author":"peltola","journal-title":"Evolution of Public Safety and Security Mobile Networks","key":"16"},{"year":"2010","author":"oberheide","journal-title":"Remote Kill and Install on Google Android","key":"13"},{"year":"2010","author":"boutet","journal-title":"Malicious Android Applications Risks and Exploitation","key":"14"},{"year":"0","key":"11"},{"year":"2013","journal-title":"Juniper Networks Third Annual Mobile Threat Report","key":"12"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1145\/2382196.2382205"},{"year":"2012","author":"mu?ller","journal-title":"FROST-Forensic Recovery of Scrambled Telephones","key":"20"},{"key":"22","article-title":"The most sophisticated android trojan","author":"unuchek","year":"2013","journal-title":"Karpersky Lab"},{"key":"23","article-title":"The goal question metric approach","author":"basili","year":"1994","journal-title":"Enclyclopedia of Software Engineering"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1007\/BF02919970"},{"key":"25","article-title":"A taxonomy of decomposition strategies based on structures, behaviors, and goals","author":"koopman","year":"1995","journal-title":"Design Theory &Methodology '95"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.1201\/9781420013283"},{"year":"2007","author":"jaquith","journal-title":"Security Metrics Replacing Fear","key":"27"},{"key":"28","article-title":"Measuring cyber security and information assurance: A state-of-The-art report","author":"bartol","year":"2009","journal-title":"Information Assurance Technology Analysis Center"},{"doi-asserted-by":"publisher","key":"29","DOI":"10.1145\/1719030.1719036"},{"key":"3","first-page":"21","author":"jansen","year":"2009","journal-title":"Directions in Security Metrics Research"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.3745\/JIPS.2009.5.4.197"},{"key":"10","article-title":"Master key","author":"forristal","year":"2013","journal-title":"The ida vulnerability"},{"key":"1","first-page":"8","author":"savola","year":"2013","journal-title":"Strategies for Security Measurement Objective Decomposition"},{"key":"30","first-page":"230","article-title":"On the feasibility of utilizing security metrics in software-intensive systems","volume":"10","author":"savola","year":"2010","journal-title":"International Journal of Computer Science and Network Security"},{"year":"0","key":"7"},{"key":"6","first-page":"1679","article-title":"Risk-driven security metrics in agile software development-an industrial pilot study","volume":"18","author":"savola","year":"2012","journal-title":"Journal of Universal Computer Science"},{"year":"2005","journal-title":"Common Criteria for Information Technology Security Evaluation-Part 1 Introduction and General Model","key":"5"},{"year":"1991","journal-title":"Information Technology Security Evaluation Criteria (ITSEC) Version 1 2","key":"4"},{"year":"2013","author":"vaughan-nichols","journal-title":"Google Releases Fix to OEMs for Blue Security Android Security Hole","key":"9"},{"year":"2013","author":"forristal","journal-title":"Uncovering Android Key That Makes 99% of Devices Vulnerable","key":"8"}],"event":{"name":"2013 Information Security for South Africa","start":{"date-parts":[[2013,8,14]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2013,8,16]]}},"container-title":["2013 Information Security for South Africa"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621627\/6641027\/06641049.pdf?arnumber=6641049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T22:30:07Z","timestamp":1490221807000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6641049\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/issa.2013.6641049","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}