{"id":"https://openalex.org/W4385078831","doi":"https://doi.org/10.1109/iwcmc58020.2023.10182983","title":"Mobile and Web Applications Clones: A Comprehensive Study","display_name":"Mobile and Web Applications Clones: A Comprehensive Study","publication_year":2023,"publication_date":"2023-06-19","ids":{"openalex":"https://openalex.org/W4385078831","doi":"https://doi.org/10.1109/iwcmc58020.2023.10182983"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc58020.2023.10182983","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc58020.2023.10182983","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092519115","display_name":"Sumaya Alhashmi","orcid":null},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Sumaya Alhashmi","raw_affiliation_strings":["UAE University,College of Information Technology,Al Ain,UAE","College of Information Technology, UAE University, Al Ain, UAE"],"affiliations":[{"raw_affiliation_string":"UAE University,College of Information Technology,Al Ain,UAE","institution_ids":["https://openalex.org/I201726411"]},{"raw_affiliation_string":"College of Information Technology, UAE University, Al Ain, UAE","institution_ids":["https://openalex.org/I201726411"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017591173","display_name":"Aysha Alneyadi","orcid":"https://orcid.org/0000-0002-6450-4713"},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Aysha Alneyadi","raw_affiliation_strings":["UAE University,College of Information Technology,Al Ain,UAE","College of Information Technology, UAE University, Al Ain, UAE"],"affiliations":[{"raw_affiliation_string":"UAE University,College of Information Technology,Al Ain,UAE","institution_ids":["https://openalex.org/I201726411"]},{"raw_affiliation_string":"College of Information Technology, UAE University, Al Ain, UAE","institution_ids":["https://openalex.org/I201726411"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110840749","display_name":"Maryam R. Al-Shehhi","orcid":null},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Maryam Alshehhi","raw_affiliation_strings":["UAE University,College of Information Technology,Al Ain,UAE","College of Information Technology, UAE University, Al Ain, UAE"],"affiliations":[{"raw_affiliation_string":"UAE University,College of Information Technology,Al Ain,UAE","institution_ids":["https://openalex.org/I201726411"]},{"raw_affiliation_string":"College of Information Technology, UAE University, Al Ain, UAE","institution_ids":["https://openalex.org/I201726411"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056806893","display_name":"Hanane Lamaazi","orcid":"https://orcid.org/0000-0003-2182-5258"},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Hanane Lamaazi","raw_affiliation_strings":["UAE University,College of Information Technology,Al Ain,UAE","College of Information Technology, UAE University, Al Ain, UAE"],"affiliations":[{"raw_affiliation_string":"UAE University,College of Information Technology,Al Ain,UAE","institution_ids":["https://openalex.org/I201726411"]},{"raw_affiliation_string":"College of Information Technology, UAE University, Al Ain, UAE","institution_ids":["https://openalex.org/I201726411"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5092519115"],"corresponding_institution_ids":["https://openalex.org/I201726411"],"apc_list":null,"apc_paid":null,"fwci":1.0166,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.75677536,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"464","last_page":"469"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6567713618278503},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.34126707911491394}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6567713618278503},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.34126707911491394}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc58020.2023.10182983","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc58020.2023.10182983","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W183494281","https://openalex.org/W1971497680","https://openalex.org/W2064038877","https://openalex.org/W2072139392","https://openalex.org/W2113137917","https://openalex.org/W2138756793","https://openalex.org/W2511803001","https://openalex.org/W2519011846","https://openalex.org/W2571359643","https://openalex.org/W2733829216","https://openalex.org/W3016674403"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2130043461","https://openalex.org/W2530322880"],"abstract_inverted_index":{"The":[0,82],"growth":[1],"of":[2,13,37,49,113,130,144,181,196],"mobile":[3],"application":[4],"and":[5,66,100,117,133,148,193],"website":[6],"markets":[7],"resulted":[8],"in":[9],"a":[10,45,179,185,194],"diverse":[11],"range":[12],"apps":[14,88,149,156,174,206],"that":[15,150,166],"are":[16,151],"localized":[17],"or":[18,35,77],"curated":[19],"for":[20,28,74,85,198],"specific":[21],"use":[22,170],"cases.":[23],"This":[24,125],"make":[25,60],"it":[26],"challenging":[27],"users":[29],"to":[30,42,63,78,120,153,171,203],"identify":[31],"the":[32,38,47,68,72,111,128,137,160,163,189],"correct":[33],"version":[34],"name":[36],"app":[39,50,70,131,138,167,199],"they":[40],"want":[41],"install.":[43],"As":[44],"result,":[46],"threat":[48],"cloning":[51,132,208],"is":[52,157,191,209],"raised,":[53],"where":[54],"adversaries":[55],"copy":[56],"an":[57],"app\u2019s":[58],"package,":[59],"minimal":[61],"changes":[62],"its":[64,134],"code,":[65],"redistribute":[67],"cloned":[69,87],"on":[71,90,136,201],"market":[73],"financial":[75],"gain":[76],"spread":[79],"malicious":[80],"payloads.":[81],"existing":[83,146],"methods":[84,147],"detecting":[86],"rely":[89],"static":[91],"signatures,":[92],"which":[93],"can":[94,169],"be":[95],"easily":[96],"evaded":[97],"using":[98],"control-flow":[99],"data-flow":[101],"obfuscation":[102],"techniques.":[103],"Additionally,":[104],"many":[105],"approaches":[106],"do":[107],"not":[108],"scale":[109],"with":[110],"number":[112],"apps,":[114],"code":[115],"size,":[116],"complexity,":[118],"leading":[119],"prohibitive":[121],"detection":[122],"time":[123],"requirements.":[124],"paper":[126,161],"investigates":[127],"issue":[129],"effects":[135],"development":[139],"industry.":[140],"A":[141],"deep":[142],"analysis":[143],"various":[145],"used":[152],"detect":[154],"clone":[155],"provided.":[158],"Also,":[159],"highlights":[162],"main":[164],"strategies":[165],"developers":[168,200],"protect":[172],"their":[173,205],"from":[175,207],"being":[176],"cloned.":[177],"Finally,":[178],"summary":[180],"our":[182],"findings":[183],"through":[184],"developed":[186],"survey":[187],"within":[188],"UAE":[190],"provided":[192],"set":[195],"recommendations":[197],"how":[202],"safeguard":[204],"suggested.":[210]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
