{"id":"https://openalex.org/W2793581381","doi":"https://doi.org/10.1109/ccnc.2018.8319325","title":"Android system security evaluation","display_name":"Android system security evaluation","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2793581381","doi":"https://doi.org/10.1109/ccnc.2018.8319325","mag":"2793581381"},"language":"en","primary_location":{"id":"doi:10.1109/ccnc.2018.8319325","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc.2018.8319325","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 15th IEEE Annual Consumer Communications &amp; Networking Conference (CCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050431745","display_name":"Igor Khokhlov","orcid":"https://orcid.org/0000-0002-8438-8959"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Igor Khokhlov","raw_affiliation_strings":["B. Thomas Golisano College of Computing and Information Sciences, Rochester Institute of Technology, Rochester, USA"],"affiliations":[{"raw_affiliation_string":"B. Thomas Golisano College of Computing and Information Sciences, Rochester Institute of Technology, Rochester, USA","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018260949","display_name":"Leon Reznik","orcid":"https://orcid.org/0000-0003-4622-220X"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Leon Reznik","raw_affiliation_strings":["B. Thomas Golisano College of Computing and Information Sciences, Rochester Institute of Technology, Rochester, USA"],"affiliations":[{"raw_affiliation_string":"B. Thomas Golisano College of Computing and Information Sciences, Rochester Institute of Technology, Rochester, USA","institution_ids":["https://openalex.org/I155173764"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5050431745"],"corresponding_institution_ids":["https://openalex.org/I155173764"],"apc_list":null,"apc_paid":null,"fwci":2.4771,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.90041769,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12799","display_name":"Mobile and Web Applications","score":0.9563000202178955,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12238","display_name":"Green IT and Sustainability","score":0.9377999901771545,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7957475185394287},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.734261691570282},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.6097460985183716},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.49130430817604065},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4511678218841553},{"id":"https://openalex.org/keywords/android-application","display_name":"Android application","score":0.4459303021430969},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.41913357377052307}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7957475185394287},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.734261691570282},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.6097460985183716},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.49130430817604065},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4511678218841553},{"id":"https://openalex.org/C3017891749","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android application","level":3,"score":0.4459303021430969},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.41913357377052307}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccnc.2018.8319325","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc.2018.8319325","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 15th IEEE Annual Consumer Communications &amp; Networking Conference (CCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320311089","display_name":"National Security Agency","ror":"https://ror.org/0047bvr32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W2765343135"],"related_works":["https://openalex.org/W1565885216","https://openalex.org/W327645657","https://openalex.org/W2012891774","https://openalex.org/W4229710179","https://openalex.org/W4298063370","https://openalex.org/W2482892055","https://openalex.org/W2965382761","https://openalex.org/W4299620683","https://openalex.org/W2464350861","https://openalex.org/W3092209205"],"abstract_inverted_index":{"This":[0],"demonstration":[1],"presents":[2],"an":[3,72],"application":[4,26,56],"for":[5],"a":[6],"system":[7],"security":[8,12,16,69,84,101],"score":[9,13],"evaluation.":[10],"The":[11,24],"represents":[14],"overall":[15,68,83],"level":[17],"of":[18,74,85],"the":[19,30,75,86,92,100],"Android":[20,35,60],"OS":[21,36,61],"based":[22,28],"device.":[23],"proposed":[25],"is":[27],"on":[29],"library":[31,52],"that":[32,47,94],"uses":[33],"standard":[34],"API":[37],"and":[38,64,88],"Google":[39],"SafetyNet":[40],"library.":[41],"We":[42],"followed":[43],"up":[44],"modular":[45],"approach":[46],"allows":[48,89],"to":[49,81,90],"use":[50],"our":[51,55],"independently":[53],"from":[54],"in":[57],"any":[58],"stock":[59],"version":[62],"5.0":[63],"above.":[65],"Application":[66],"evaluates":[67],"level,":[70],"gives":[71,78],"explanation":[73],"each":[76,97],"parameter,":[77],"advices":[79],"how":[80,96],"improve":[82],"device,":[87],"simulate":[91],"evaluation":[93],"shows":[95],"parameter":[98],"affects":[99],"level.":[102]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
