{"id":"https://openalex.org/W2917022287","doi":"https://doi.org/10.1007/s42044-019-00032-3","title":"A new technique for intent elicitation in Android applications","display_name":"A new technique for intent elicitation in Android applications","publication_year":2019,"publication_date":"2019-02-25","ids":{"openalex":"https://openalex.org/W2917022287","doi":"https://doi.org/10.1007/s42044-019-00032-3","mag":"2917022287"},"language":"en","primary_location":{"id":"doi:10.1007/s42044-019-00032-3","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s42044-019-00032-3","pdf_url":null,"source":{"id":"https://openalex.org/S4210220078","display_name":"Iran Journal of Computer Science","issn_l":"2520-8438","issn":["2520-8438","2520-8446"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Iran Journal of Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091481030","display_name":"Mohamed A. El-Zawawy","orcid":"https://orcid.org/0000-0002-5208-124X"},"institutions":[{"id":"https://openalex.org/I145487455","display_name":"Cairo University","ror":"https://ror.org/03q21mh05","country_code":"EG","type":"education","lineage":["https://openalex.org/I145487455"]},{"id":"https://openalex.org/I240666556","display_name":"Imam Mohammad ibn Saud Islamic University","ror":"https://ror.org/05gxjyb39","country_code":"SA","type":"education","lineage":["https://openalex.org/I240666556"]}],"countries":["EG","SA"],"is_corresponding":true,"raw_author_name":"Mohamed A. El-Zawawy","raw_affiliation_strings":["College of Computer and Information Sciences, Al Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh, Kingdom of Saudi Arabia","Department of Mathematics, Faculty of Science, Cairo University, Giza, 12613, Egypt","Department of Mathematics, Faculty of Science, Cairo University, Giza, Egypt"],"affiliations":[{"raw_affiliation_string":"College of Computer and Information Sciences, Al Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh, Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I240666556"]},{"raw_affiliation_string":"Department of Mathematics, Faculty of Science, Cairo University, Giza, 12613, Egypt","institution_ids":["https://openalex.org/I145487455"]},{"raw_affiliation_string":"Department of Mathematics, Faculty of Science, Cairo University, Giza, Egypt","institution_ids":["https://openalex.org/I145487455"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5091481030"],"corresponding_institution_ids":["https://openalex.org/I145487455","https://openalex.org/I240666556"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.01226283,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2","issue":"2","first_page":"113","last_page":"124"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9860000014305115,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8172870874404907},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7022784948348999},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6122378706932068},{"id":"https://openalex.org/keywords/android-application","display_name":"Android application","score":0.5733464956283569},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.5668754577636719},{"id":"https://openalex.org/keywords/android-beam","display_name":"Android Beam","score":0.42652127146720886},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.37018316984176636},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35529637336730957},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3505288362503052},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.33754146099090576}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8172870874404907},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7022784948348999},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6122378706932068},{"id":"https://openalex.org/C3017891749","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android application","level":3,"score":0.5733464956283569},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.5668754577636719},{"id":"https://openalex.org/C65902250","wikidata":"https://www.wikidata.org/wiki/Q4759452","display_name":"Android Beam","level":3,"score":0.42652127146720886},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.37018316984176636},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35529637336730957},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3505288362503052},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.33754146099090576}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s42044-019-00032-3","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s42044-019-00032-3","pdf_url":null,"source":{"id":"https://openalex.org/S4210220078","display_name":"Iran Journal of Computer Science","issn_l":"2520-8438","issn":["2520-8438","2520-8446"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Iran Journal of Computer Science","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W769484497","https://openalex.org/W1511682410","https://openalex.org/W1675807641","https://openalex.org/W1979247086","https://openalex.org/W1994588724","https://openalex.org/W2007857904","https://openalex.org/W2091540464","https://openalex.org/W2093759357","https://openalex.org/W2094245295","https://openalex.org/W2122672392","https://openalex.org/W2308726246","https://openalex.org/W2551095084","https://openalex.org/W2594268473","https://openalex.org/W2614592200"],"related_works":["https://openalex.org/W2717179875","https://openalex.org/W4249118297","https://openalex.org/W2012891774","https://openalex.org/W2886650884","https://openalex.org/W155698376","https://openalex.org/W2239562684","https://openalex.org/W2804507448","https://openalex.org/W3108666054","https://openalex.org/W2418141673","https://openalex.org/W973818352"],"abstract_inverted_index":null,"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
