{"id":"https://openalex.org/W2907278613","doi":"https://doi.org/10.1109/tifs.2018.2889924","title":"Securing Android App Markets via Modeling and Predicting Malware Spread Between Markets","display_name":"Securing Android App Markets via Modeling and Predicting Malware Spread Between Markets","publication_year":2018,"publication_date":"2018-12-27","ids":{"openalex":"https://openalex.org/W2907278613","doi":"https://doi.org/10.1109/tifs.2018.2889924","mag":"2907278613"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2018.2889924","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2018.2889924","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017417068","display_name":"Guozhu Meng","orcid":"https://orcid.org/0000-0001-6388-2571"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guozhu Meng","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054852821","display_name":"Matthew T. Patrick","orcid":"https://orcid.org/0000-0002-6174-9002"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Matthew Patrick","raw_affiliation_strings":["Department of Dermatology, University of Michigan, Ann Arbor, MI, USA"],"affiliations":[{"raw_affiliation_string":"Department of Dermatology, University of Michigan, Ann Arbor, MI, USA","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083669929","display_name":"Yinxing Xue","orcid":"https://orcid.org/0000-0002-2979-7151"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yinxing Xue","raw_affiliation_strings":["School of Computer Science and Technology, Suzhou Institute for Advanced Study, University of Science and Technology of China, Hefei, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Suzhou Institute for Advanced Study, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100355692","display_name":"Yang Liu","orcid":"https://orcid.org/0000-0001-7300-9215"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Yang Liu","raw_affiliation_strings":["School of Computer Science and Engineering, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100436880","display_name":"Jie Zhang","orcid":"https://orcid.org/0000-0003-2979-3182"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Jie Zhang","raw_affiliation_strings":["School of Computer Science and Engineering, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5017417068"],"corresponding_institution_ids":["https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":2.6423,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.91400915,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"14","issue":"7","first_page":"1944","last_page":"1959"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9668999910354614,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9376058578491211},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8371026515960693},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7168545126914978},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.6854952573776245},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5499977469444275},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.4414176344871521},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3187949061393738},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14265918731689453}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9376058578491211},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8371026515960693},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7168545126914978},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.6854952573776245},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5499977469444275},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.4414176344871521},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3187949061393738},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14265918731689453}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2018.2889924","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2018.2889924","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:dr.ntu.edu.sg:10356/150817","is_oa":false,"landing_page_url":"https://hdl.handle.net/10356/150817","pdf_url":null,"source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal Article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Good health and well-being","score":0.6899999976158142,"id":"https://metadata.un.org/sdg/3"}],"awards":[{"id":"https://openalex.org/G7994252791","display_name":null,"funder_award_id":"SNHTBH-2017110681","funder_id":"https://openalex.org/F4320321133","funder_display_name":"Chinese Academy of Sciences"}],"funders":[{"id":"https://openalex.org/F4320321133","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":60,"referenced_works":["https://openalex.org/W34283345","https://openalex.org/W63943769","https://openalex.org/W187159034","https://openalex.org/W1498730105","https://openalex.org/W1603502149","https://openalex.org/W1774848501","https://openalex.org/W1969381345","https://openalex.org/W1978136502","https://openalex.org/W1982041549","https://openalex.org/W1989811622","https://openalex.org/W1990192858","https://openalex.org/W2005813008","https://openalex.org/W2050049213","https://openalex.org/W2061686014","https://openalex.org/W2064038877","https://openalex.org/W2073457560","https://openalex.org/W2092973638","https://openalex.org/W2095423914","https://openalex.org/W2100734403","https://openalex.org/W2113952909","https://openalex.org/W2118820208","https://openalex.org/W2125011234","https://openalex.org/W2133145073","https://openalex.org/W2140540364","https://openalex.org/W2141437965","https://openalex.org/W2142226287","https://openalex.org/W2152149943","https://openalex.org/W2155418451","https://openalex.org/W2158956373","https://openalex.org/W2161804775","https://openalex.org/W2163296115","https://openalex.org/W2169397725","https://openalex.org/W2171322701","https://openalex.org/W2258956667","https://openalex.org/W2277141454","https://openalex.org/W2308726246","https://openalex.org/W2403995870","https://openalex.org/W2413066062","https://openalex.org/W2462192250","https://openalex.org/W2504196632","https://openalex.org/W2514847810","https://openalex.org/W2564813630","https://openalex.org/W2572070369","https://openalex.org/W2583329118","https://openalex.org/W2586256972","https://openalex.org/W2606250847","https://openalex.org/W2617476279","https://openalex.org/W2620844046","https://openalex.org/W2625739732","https://openalex.org/W2735251792","https://openalex.org/W2743887479","https://openalex.org/W2770368305","https://openalex.org/W2963463723","https://openalex.org/W2963734869","https://openalex.org/W3099289621","https://openalex.org/W3140874755","https://openalex.org/W4236706032","https://openalex.org/W4246503064","https://openalex.org/W6602633499","https://openalex.org/W6719212312"],"related_works":["https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W2591124010","https://openalex.org/W3200508744","https://openalex.org/W3025122950","https://openalex.org/W2311926078","https://openalex.org/W2895504842","https://openalex.org/W4281384336","https://openalex.org/W2717179875","https://openalex.org/W4249118297"],"abstract_inverted_index":{"The":[0,201,237],"Android":[1,8,28,46,83,92,232,250],"ecosystem":[2,84],"has":[3,30],"recently":[4],"dominated":[5],"mobile":[6],"devices.":[7],"app":[9],"markets,":[10,19,170],"including":[11],"official":[12],"Google":[13],"Play":[14],"and":[15,26,38,65,87,118,123,163,182,245,256,261,267],"other":[16],"third":[17],"party":[18],"are":[20],"becoming":[21],"hotbeds,":[22],"where":[23],"malware":[24,29,47,64,93,129,137,156,228,251],"originates":[25],"spreads.":[27],"been":[31],"observed":[32],"to":[33,59,80,217],"both":[34,160],"propagate":[35],"within":[36],"markets":[37,49,126,233,264],"spread":[39,44,90,107,112,141,198],"between":[40,48,94],"markets.":[41,95,200],"If":[42],"the":[43,61,67,77,82,89,101,106,120,144,154,161,177,186,235,247,258],"of":[45,63,91,108,136,165,227,249],"can":[50,55,243],"be":[51],"predicted,":[52],"market":[53,173],"administrators":[54],"take":[56],"appropriate":[57],"measures":[58],"prevent":[60],"outbreak":[62],"minimize":[66],"damages":[68],"caused":[69],"by":[70,85,158,175],"malware.":[71],"In":[72],"this":[73,97],"paper,":[74],"we":[75,99,139,152,171,190,221],"make":[76],"first":[78],"attempt":[79],"protect":[81],"modeling":[86],"predicting":[88],"To":[96,131,213],"end,":[98],"study":[100],"social":[102],"behaviors":[103,113,142],"that":[104],"affect":[105],"malware,":[109],"model":[110,140,153,195,202],"these":[111],"with":[114,265],"multiple":[115,169],"epidemic":[116],"models,":[117],"predict":[119,257],"infection":[121,259],"time":[122,260],"order":[124,262],"among":[125,180,199,263],"for":[127,148,168,197],"well-known":[128],"families.":[130],"achieve":[132],"an":[133],"accurate":[134],"prediction":[135],"spread,":[138],"in":[143],"following":[145],"fashion:":[146],"1)":[147],"a":[149,192,207,223,253],"single":[150],"market,":[151],"within-market":[155],"growth":[157,248],"considering":[159],"creation":[162],"removal":[164],"malware;":[166],"2)":[167],"determine":[172],"relevance":[174],"calculating":[176],"mutual":[178],"information":[179],"them;":[181],"3)":[183],"based":[184],"on":[185,252],"previous":[187],"two":[188],"steps,":[189],"simulate":[191,246],"susceptible":[193],"infected":[194],"stochastically":[196],"inference":[203],"is":[204],"performed":[205],"using":[206],"publicly":[208],"available":[209],"well-labeled":[210],"dataset":[211],"AndRadar.":[212],"conduct":[214],"extensive":[215],"experiments":[216],"evaluate":[218],"our":[219,241],"approach,":[220],"collected":[222],"large":[224,254],"number":[225],"(334,782)":[226],"samples":[229],"from":[230],"25":[231],"around":[234],"world.":[236],"experimental":[238],"results":[239],"show":[240],"approach":[242],"depict":[244],"scale,":[255],"0.89":[266],"0.66":[268],"precision,":[269],"respectively.":[270]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
