{"id":"https://openalex.org/W2607021789","doi":"https://doi.org/10.3906/elk-1503-127","title":"Implementation of a web-based service for mobile application risk assessment","display_name":"Implementation of a web-based service for mobile application risk assessment","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2607021789","doi":"https://doi.org/10.3906/elk-1503-127","mag":"2607021789"},"language":"en","primary_location":{"id":"doi:10.3906/elk-1503-127","is_oa":false,"landing_page_url":"https://doi.org/10.3906/elk-1503-127","pdf_url":null,"source":{"id":"https://openalex.org/S32837994","display_name":"TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES","issn_l":"1300-0632","issn":["1300-0632","1303-6203"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318422","host_organization_name":"Scientific and Technological Research Council of Turkey (TUBITAK)","host_organization_lineage":["https://openalex.org/P4310318422"],"host_organization_lineage_names":["Scientific and Technological Research Council of Turkey (TUBITAK)"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TURKISH JOURNAL OF ELECTRICAL ENGINEERING &amp; COMPUTER SCIENCES","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030577249","display_name":"As\u0131m Sinan Y\u00fcksel","orcid":"https://orcid.org/0000-0003-1986-5269"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"As\u0131m Sinan Y\u00dcKSEL","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051068297","display_name":"Mehmet Erkan Y\u00fcksel","orcid":"https://orcid.org/0000-0001-8976-9964"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mehmet Erkan Y\u00dcKSEL","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065102655","display_name":"Ahmet Sertba\u015f","orcid":"https://orcid.org/0000-0001-8166-1211"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ahmet SERTBA\u015e","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5069589514","display_name":"Abd\u00fcl Halim Zaim","orcid":"https://orcid.org/0000-0002-0233-064X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Abd\u00fcl Halim ZA\u0130M","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5030577249"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.9018,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.9235151,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"25","issue":null,"first_page":"976","last_page":"994"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12799","display_name":"Mobile and Web Applications","score":0.967199981212616,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12799","display_name":"Mobile and Web Applications","score":0.967199981212616,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9523000121116638,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10444","display_name":"Context-Aware Activity Recognition Systems","score":0.9261000156402588,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7299081683158875},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6529842615127563},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5031737685203552},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.4820481240749359},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4423193633556366},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.43981456756591797},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.43263542652130127},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4303998351097107}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7299081683158875},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6529842615127563},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5031737685203552},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.4820481240749359},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4423193633556366},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.43981456756591797},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.43263542652130127},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4303998351097107},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3906/elk-1503-127","is_oa":false,"landing_page_url":"https://doi.org/10.3906/elk-1503-127","pdf_url":null,"source":{"id":"https://openalex.org/S32837994","display_name":"TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES","issn_l":"1300-0632","issn":["1300-0632","1303-6203"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318422","host_organization_name":"Scientific and Technological Research Council of Turkey (TUBITAK)","host_organization_lineage":["https://openalex.org/P4310318422"],"host_organization_lineage_names":["Scientific and Technological Research Council of Turkey (TUBITAK)"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TURKISH JOURNAL OF ELECTRICAL ENGINEERING &amp; COMPUTER SCIENCES","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2368605798","https://openalex.org/W2518037665","https://openalex.org/W2348524959","https://openalex.org/W2368049389","https://openalex.org/W2384861574","https://openalex.org/W2717179875","https://openalex.org/W4249118297","https://openalex.org/W4312334973","https://openalex.org/W1963923654","https://openalex.org/W1974604873"],"abstract_inverted_index":{"The":[0,130,150],"Android":[1],"operating":[2],"system":[3,123,131,151],"has":[4,9],"increased":[5],"in":[6,14],"popularity":[7],"and":[8,32,54,93,102,113,140,169],"been":[10],"increasing":[11],"its":[12],"shares":[13],"the":[15,46,58,64,67,91,96,100,133,153,156,161,166],"smart":[16],"phone":[17],"market.":[18],"Users":[19],"can":[20,89],"carry":[21],"out":[22],"their":[23],"daily":[24],"work":[25],"such":[26,48],"as":[27,49,126,171],"paying":[28],"bills,":[29],"being":[30],"social,":[31],"sharing":[33],"photos":[34],"through":[35],"mobile":[36,138],"applications.":[37],"These":[38],"applications":[39,65,71,139,164],"have":[40,60,72,85,111],"access":[41,73],"to":[42,136],"sensitive":[43,104],"information":[44,69],"about":[45],"user,":[47],"location,":[50],"contacts,":[51],"call":[52],"logs,":[53],"SMS":[55],"messages.":[56],"However,":[57],"users":[59],"no":[61],"knowledge":[62],"of":[63,95,117,158,163],"or":[66,82],"personal":[68,105],"these":[70],"to.":[74],"Even":[75],"if":[76],"an":[77,172],"application":[78],"is":[79],"not":[80,84],"malware":[81],"does":[83],"malicious":[86],"behavior,":[87],"it":[88],"compromise":[90],"security":[92],"privacy":[94],"user":[97,154],"by":[98,144],"accessing":[99],"permissions":[101],"gathering":[103],"information.":[106],"In":[107],"this":[108],"study,":[109],"we":[110],"designed":[112],"implemented":[114],"a":[115,118,127],"prototype":[116],"novel":[119],"fuzzy":[120],"risk":[121,142],"inference":[122],"that":[124],"serves":[125,170],"web-based":[128],"service.":[129],"analyzes":[132],"risks":[134,157],"related":[135],"Android-based":[137],"performs":[141],"scoring":[143],"taking":[145],"several":[146],"features":[147],"into":[148],"account.":[149],"presents":[152],"with":[155],"exposure":[159],"before":[160],"installation":[162],"on":[165],"user's":[167],"device":[168],"intelligent":[173],"decision":[174],"support":[175],"system.":[176]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
