{"id":"https://openalex.org/W2552512183","doi":"https://doi.org/10.1145/2994152","title":"Teaching android security through examples","display_name":"Teaching android security through examples","publication_year":2016,"publication_date":"2016-11-21","ids":{"openalex":"https://openalex.org/W2552512183","doi":"https://doi.org/10.1145/2994152","mag":"2552512183"},"language":"en","primary_location":{"id":"doi:10.1145/2994152","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2994152","pdf_url":null,"source":{"id":"https://openalex.org/S2764691006","display_name":"ACM Inroads","issn_l":"2153-2184","issn":["2153-2184","2153-2192"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Inroads","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034041554","display_name":"Daniel E. Krutz","orcid":"https://orcid.org/0000-0002-0310-3086"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Daniel E. Krutz","raw_affiliation_strings":["RIT - Software Engineering"],"affiliations":[{"raw_affiliation_string":"RIT - Software Engineering","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012841049","display_name":"Samuel A. Malachowsky","orcid":"https://orcid.org/0000-0001-9229-4365"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Samuel A. Malachowsky","raw_affiliation_strings":["RIT - Software Engineering"],"affiliations":[{"raw_affiliation_string":"RIT - Software Engineering","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5034041554"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.1610837,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"7","issue":"4","first_page":"96","last_page":"98"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.95660001039505,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9458000063896179,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7904163002967834},{"id":"https://openalex.org/keywords/citation","display_name":"Citation","score":0.696455717086792},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6896941661834717},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5627256631851196},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5215284824371338},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4754966199398041},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3679504692554474},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3360643982887268}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7904163002967834},{"id":"https://openalex.org/C2778805511","wikidata":"https://www.wikidata.org/wiki/Q1713","display_name":"Citation","level":2,"score":0.696455717086792},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6896941661834717},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5627256631851196},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5215284824371338},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4754966199398041},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3679504692554474},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3360643982887268}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2994152","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2994152","pdf_url":null,"source":{"id":"https://openalex.org/S2764691006","display_name":"ACM Inroads","issn_l":"2153-2184","issn":["2153-2184","2153-2192"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Inroads","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2165251242","https://openalex.org/W2418291489","https://openalex.org/W2068121105","https://openalex.org/W3134738208","https://openalex.org/W3096519538","https://openalex.org/W1973516247","https://openalex.org/W4241166160","https://openalex.org/W589730254","https://openalex.org/W2829478414","https://openalex.org/W1565885216"],"abstract_inverted_index":{"column":[0],"Share":[1],"on":[2,96],"Teaching":[3],"android":[4],"security":[5],"through":[6],"examples:":[7],"a":[8,82,114],"publicly":[9],"available":[10],"database":[11],"of":[12],"vulnerable":[13],"apps":[14],"Authors:":[15],"Daniel":[16],"E.":[17],"Krutz":[18],"RIT":[19,23,32,36],"-":[20,24,33,37],"Software":[21,25,34,38],"Engineering":[22,35],"EngineeringView":[26,39],"Profile":[27,40],",":[28],"Samuel":[29],"A.":[30],"Malachowsky":[31],"Authors":[41],"Info":[42],"&":[43],"Claims":[44],"ACM":[45],"InroadsVolume":[46],"7Issue":[47],"4December":[48],"2016":[49],"pp":[50],"96\u201398https://doi.org/10.1145/2994152Published:21":[51],"November":[52],"2016Publication":[53],"History":[54],"0citation148DownloadsMetricsTotal":[55],"Citations0Total":[56],"Downloads148Last":[57],"12":[58],"Months5Last":[59],"6":[60],"weeks2":[61],"Get":[62],"Citation":[63,65,102],"AlertsNew":[64,101],"Alert":[66],"added!This":[67],"alert":[68,93],"has":[69,88],"been":[70,89],"successfully":[71],"added":[72],"and":[73],"will":[74,78],"be":[75,79],"sent":[76],"to:You":[77],"notified":[80],"whenever":[81],"record":[83],"that":[84],"you":[85],"have":[86],"chosen":[87],"cited.To":[90],"manage":[91],"your":[92,107],"preferences,":[94],"click":[95],"the":[97],"button":[98],"below.Manage":[99],"my":[100],"Alert!Please":[103],"log":[104],"in":[105],"to":[106,110,112],"account":[108],"Save":[109],"BinderSave":[111],"BinderCreate":[113],"New":[115],"BinderNameCancelCreateExport":[116],"CitationPublisher":[117],"SiteGet":[118],"Access":[119]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
