A survey of app store analysis for software engineering
App Store Analysis studies information about applications obtained from app stores. App
stores provide a wealth of information derived from users that would not exist had the …
stores provide a wealth of information derived from users that would not exist had the …
Effective and efficient hybrid android malware classification using pseudo-label stacked auto-encoder
Android has become the target of attackers because of its popularity. The detection of
Android mobile malware has become increasingly important due to its significant threat …
Android mobile malware has become increasingly important due to its significant threat …
Dynamic android malware category classification using semi-supervised deep learning
Due to the significant threat of Android mobile malware, its detection has become
increasingly important. Despite the academic and industrial attempts, devising a robust and …
increasingly important. Despite the academic and industrial attempts, devising a robust and …
A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …
escalation in the number and sophistication of the security threats targeted at mobile …
Rmvdroid: towards a reliable android malware dataset with app metadata
A large number of research studies have been focused on detecting Android malware in
recent years. As a result, a reliable and large-scale malware dataset is essential to build …
recent years. As a result, a reliable and large-scale malware dataset is essential to build …
Rosf: Leveraging information retrieval and supervised learning for recommending code snippets
When implementing unfamiliar programming tasks, developers commonly search code
examples and learn usage patterns of APIs from the code examples or reuse them by copy …
examples and learn usage patterns of APIs from the code examples or reuse them by copy …
Requirements dependency extraction by integrating active learning with ontology-based retrieval
Context: Incomplete or incorrect detection of requirement dependencies has proven to result
in reduced release quality and substantial rework. Additionally, the extraction of …
in reduced release quality and substantial rework. Additionally, the extraction of …
Local-based active classification of test report to assist crowdsourced testing
In crowdsourced testing, an important task is to identify the test reports that actually reveal
fault-true fault, from the large number of test reports submitted by crowd workers. Most …
fault-true fault, from the large number of test reports submitted by crowd workers. Most …
Comparing mobile apps by identifying 'Hot'features
H Malik, EM Shakshuki, WS Yoo - Future Generation Computer Systems, 2020 - Elsevier
User review is a crucial component of open mobile app market such as the Google Play
Store. These markets allow users to submit feedback for downloaded apps in the form of (a) …
Store. These markets allow users to submit feedback for downloaded apps in the form of (a) …
An empirical study of sms one-time password authentication in android apps
A great quantity of user passwords nowadays has been leaked through security breaches of
user accounts. To enhance the security of the Password Authentication Protocol (PAP) in …
user accounts. To enhance the security of the Password Authentication Protocol (PAP) in …