{"id":"https://openalex.org/W3217144133","doi":"https://doi.org/10.3390/jcp1040035","title":"Modeling Correlation between Android Permissions Based on Threat and Protection Level Using Exploratory Factor Plane Analysis","display_name":"Modeling Correlation between Android Permissions Based on Threat and Protection Level Using Exploratory Factor Plane Analysis","publication_year":2021,"publication_date":"2021-11-30","ids":{"openalex":"https://openalex.org/W3217144133","doi":"https://doi.org/10.3390/jcp1040035","mag":"3217144133"},"language":"en","primary_location":{"id":"doi:10.3390/jcp1040035","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp1040035","pdf_url":"https://www.mdpi.com/2624-800X/1/4/35/pdf?version=1638415237","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2624-800X/1/4/35/pdf?version=1638415237","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085428147","display_name":"Moses Ashawa","orcid":"https://orcid.org/0000-0002-1016-0791"},"institutions":[{"id":"https://openalex.org/I82284825","display_name":"Cranfield University","ror":"https://ror.org/05cncd958","country_code":"GB","type":"education","lineage":["https://openalex.org/I82284825"]},{"id":"https://openalex.org/I933054736","display_name":"Defence Academy of the United Kingdom","ror":"https://ror.org/03myaza48","country_code":"GB","type":"education","lineage":["https://openalex.org/I1306956679","https://openalex.org/I2802373619","https://openalex.org/I933054736"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Moses Ashawa","raw_affiliation_strings":["Digital Investigation Unit/Centre for Electronic Warfare, Information, and Cyber/Defence and Security, Defence Academy of the UK, Cranfield University, Shrivenham SN6 8LA, UK"],"raw_orcid":"https://orcid.org/0000-0002-1016-0791","affiliations":[{"raw_affiliation_string":"Digital Investigation Unit/Centre for Electronic Warfare, Information, and Cyber/Defence and Security, Defence Academy of the UK, Cranfield University, Shrivenham SN6 8LA, UK","institution_ids":["https://openalex.org/I933054736","https://openalex.org/I82284825"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074029352","display_name":"Sarah Morris","orcid":"https://orcid.org/0000-0002-9482-6270"},"institutions":[{"id":"https://openalex.org/I82284825","display_name":"Cranfield University","ror":"https://ror.org/05cncd958","country_code":"GB","type":"education","lineage":["https://openalex.org/I82284825"]},{"id":"https://openalex.org/I933054736","display_name":"Defence Academy of the United Kingdom","ror":"https://ror.org/03myaza48","country_code":"GB","type":"education","lineage":["https://openalex.org/I1306956679","https://openalex.org/I2802373619","https://openalex.org/I933054736"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sarah Morris","raw_affiliation_strings":["Digital Investigation Unit/Centre for Electronic Warfare, Information, and Cyber/Defence and Security, Defence Academy of the UK, Cranfield University, Shrivenham SN6 8LA, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Digital Investigation Unit/Centre for Electronic Warfare, Information, and Cyber/Defence and Security, Defence Academy of the UK, Cranfield University, Shrivenham SN6 8LA, UK","institution_ids":["https://openalex.org/I933054736","https://openalex.org/I82284825"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5085428147"],"corresponding_institution_ids":["https://openalex.org/I82284825","https://openalex.org/I933054736"],"apc_list":{"value":1000,"currency":"CHF","value_usd":1082},"apc_paid":{"value":1000,"currency":"CHF","value_usd":1082},"fwci":0.4626,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.63279368,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"1","issue":"4","first_page":"704","last_page":"742"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12799","display_name":"Mobile and Web Applications","score":0.96670001745224,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7860363721847534},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7775896191596985},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7581760883331299},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5186713933944702},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.5149503350257874},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4879691004753113},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.4794810712337494},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.4610660672187805},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.20345070958137512},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.19220909476280212}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7860363721847534},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7775896191596985},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7581760883331299},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5186713933944702},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.5149503350257874},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4879691004753113},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.4794810712337494},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.4610660672187805},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.20345070958137512},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.19220909476280212},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/jcp1040035","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp1040035","pdf_url":"https://www.mdpi.com/2624-800X/1/4/35/pdf?version=1638415237","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ef02b03794b245e4a11bf2edd283b236","is_oa":true,"landing_page_url":"https://doaj.org/article/ef02b03794b245e4a11bf2edd283b236","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cybersecurity and Privacy, Vol 1, Iss 4, Pp 704-742 (2021)","raw_type":"article"},{"id":"pmh:oai:dspace.lib.cranfield.ac.uk:1826/17484","is_oa":true,"landing_page_url":"http://dspace.lib.cranfield.ac.uk/handle/1826/17484","pdf_url":null,"source":{"id":"https://openalex.org/S4306401778","display_name":"CERES (Cranfield University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I82284825","host_organization_name":"Cranfield University","host_organization_lineage":["https://openalex.org/I82284825"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":{"id":"doi:10.3390/jcp1040035","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp1040035","pdf_url":"https://www.mdpi.com/2624-800X/1/4/35/pdf?version=1638415237","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5099999904632568,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G4857740365","display_name":null,"funder_award_id":"PTDF/ED/PHD/AMA/1245/17/17","funder_id":"https://openalex.org/F4320335413","funder_display_name":"Petroleum Technology Development Fund"}],"funders":[{"id":"https://openalex.org/F4320335413","display_name":"Petroleum Technology Development Fund","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3217144133.pdf","grobid_xml":"https://content.openalex.org/works/W3217144133.grobid-xml"},"referenced_works_count":91,"referenced_works":["https://openalex.org/W59205045","https://openalex.org/W1875842236","https://openalex.org/W1986330503","https://openalex.org/W1993410487","https://openalex.org/W2026653933","https://openalex.org/W2033811191","https://openalex.org/W2041856448","https://openalex.org/W2055703785","https://openalex.org/W2071000950","https://openalex.org/W2079810998","https://openalex.org/W2091800485","https://openalex.org/W2092712591","https://openalex.org/W2099525266","https://openalex.org/W2105211958","https://openalex.org/W2114275288","https://openalex.org/W2117081927","https://openalex.org/W2124390650","https://openalex.org/W2128128903","https://openalex.org/W2153942313","https://openalex.org/W2156588619","https://openalex.org/W2157661720","https://openalex.org/W2158940195","https://openalex.org/W2163936573","https://openalex.org/W2171389360","https://openalex.org/W2317962558","https://openalex.org/W2511979442","https://openalex.org/W2565446072","https://openalex.org/W2568897335","https://openalex.org/W2572557825","https://openalex.org/W2601443655","https://openalex.org/W2612340813","https://openalex.org/W2613058939","https://openalex.org/W2742824409","https://openalex.org/W2766375570","https://openalex.org/W2766670511","https://openalex.org/W2769669597","https://openalex.org/W2786453435","https://openalex.org/W2787041497","https://openalex.org/W2792310543","https://openalex.org/W2798044691","https://openalex.org/W2807561677","https://openalex.org/W2913594971","https://openalex.org/W2940477855","https://openalex.org/W2943383044","https://openalex.org/W2945945312","https://openalex.org/W2946009685","https://openalex.org/W2962734274","https://openalex.org/W2962784645","https://openalex.org/W2964008753","https://openalex.org/W2982143087","https://openalex.org/W2982705228","https://openalex.org/W2998214371","https://openalex.org/W2999074620","https://openalex.org/W3003107098","https://openalex.org/W3004724846","https://openalex.org/W3005767155","https://openalex.org/W3006325478","https://openalex.org/W3007824786","https://openalex.org/W3011574394","https://openalex.org/W3033260057","https://openalex.org/W3040974506","https://openalex.org/W3048388568","https://openalex.org/W3049263593","https://openalex.org/W3089879502","https://openalex.org/W3093636427","https://openalex.org/W3094657717","https://openalex.org/W3106657271","https://openalex.org/W3109572743","https://openalex.org/W3118507196","https://openalex.org/W3119955105","https://openalex.org/W3127643539","https://openalex.org/W3127856617","https://openalex.org/W3128616636","https://openalex.org/W3131231119","https://openalex.org/W3132174378","https://openalex.org/W3134221566","https://openalex.org/W3135551186","https://openalex.org/W3135916744","https://openalex.org/W3136874603","https://openalex.org/W3137781054","https://openalex.org/W3157257603","https://openalex.org/W3186414162","https://openalex.org/W4248166950","https://openalex.org/W4254029842","https://openalex.org/W6684801420","https://openalex.org/W6737861784","https://openalex.org/W6748854608","https://openalex.org/W6750200157","https://openalex.org/W6774000870","https://openalex.org/W6779421079","https://openalex.org/W6788387437"],"related_works":["https://openalex.org/W2316685381","https://openalex.org/W2538622067","https://openalex.org/W3003485427","https://openalex.org/W2056388267","https://openalex.org/W4210309948","https://openalex.org/W2249350383","https://openalex.org/W2755037920","https://openalex.org/W4249118297","https://openalex.org/W2717179875","https://openalex.org/W4388923452"],"abstract_inverted_index":{"The":[0],"evolution":[1],"of":[2,11,23,66,75,129,153],"mobile":[3,14,19,29,56,85],"technology":[4],"has":[5,193],"increased":[6],"correspondingly":[7],"with":[8,160,201],"the":[9,24,28,60,76,100,136,172,202,207],"number":[10],"attacks":[12],"on":[13,18,181],"devices.":[15],"Malware":[16],"attack":[17],"devices":[20],"is":[21,59,73],"one":[22,74],"top":[25],"security":[26,78],"challenges":[27],"community":[30],"faces":[31],"daily.":[32],"While":[33],"malware":[34,44,64],"classification":[35],"and":[36,70,83,91,106,138,148,156,176,184],"detection":[37],"tools":[38],"are":[39],"being":[40],"developed":[41],"to":[42,87,110,120],"fight":[43],"infection,":[45],"hackers":[46],"keep":[47],"deploying":[48],"different":[49,161],"infection":[50],"strategies,":[51],"including":[52],"permissions":[53,122,175,200],"usage.":[54],"Among":[55],"platforms,":[57],"Android":[58,82,125,178],"most":[61],"targeted":[62],"by":[63,81],"because":[65],"its":[67],"open":[68],"OS":[69],"popularity.":[71],"Permissions":[72],"major":[77],"techniques":[79,109],"used":[80,99,132],"other":[84],"platforms":[86],"control":[88],"device":[89],"resources":[90],"enhance":[92],"access":[93],"control.":[94],"In":[95],"this":[96,134],"study,":[97],"we":[98],"t-Distribution":[101],"stochastic":[102],"neighbor":[103],"embedding":[104],"(t-SNE)":[105],"Self-Organizing":[107],"Map":[108],"produce":[111],"a":[112,194],"visualization":[113],"method":[114,169],"using":[115],"exploratory":[116],"factor":[117],"plane":[118],"analysis":[119],"visualize":[121],"correlation":[123,173],"in":[124],"applications.":[126],"Two":[127],"categories":[128,162],"datasets":[130],"were":[131,163],"for":[133],"study:":[135],"benign":[137,158],"malicious":[139,155],"datasets.":[140],"Dataset":[141],"was":[142],"obtained":[143],"from":[144],"Contagio,":[145],"VirusShare,":[146],"VirusTotal,":[147],"Androzoo":[149],"repositories.":[150],"A":[151],"total":[152],"12,267":[154],"10,837":[157],"applications":[159,179],"used.":[164],"We":[165],"demonstrate":[166],"that":[167,190],"our":[168],"can":[170],"identify":[171],"between":[174],"classify":[177],"based":[180],"their":[182],"protection":[183,204],"threat":[185,195,209],"level.":[186,196,210],"Our":[187],"results":[188],"show":[189],"every":[191],"permission":[192],"This":[197],"signifies":[198],"those":[199],"same":[203,208],"level":[205],"have":[206]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2021-12-06T00:00:00"}
