Get quick answers to your questions about the article from our AI researcher chatbot
{'id': 'https://openalex.org/W2489909539', 'doi': 'https://doi.org/10.19107/ijisc.2016.01.02', 'title': 'Android and iOS Security – An Analysis and Comparison Report', 'display_name': 'Android and iOS Security – An Analysis and Comparison Report', 'publication_year': 2016, 'publication_date': '2016-06-29', 'ids': {'openalex': 'https://openalex.org/W2489909539', 'doi': 'https://doi.org/10.19107/ijisc.2016.01.02', 'mag': '2489909539'}, 'language': 'en', 'primary_location': {'is_oa': False, 'landing_page_url': 'https://doi.org/10.19107/ijisc.2016.01.02', 'pdf_url': None, 'source': {'id': 'https://openalex.org/S4210229641', 'display_name': 'International Journal of Information Security and Cybercrime', 'issn_l': '2285-9225', 'issn': ['2285-9225', '2286-0096'], 'is_oa': False, 'is_in_doaj': False, 'is_core': False, 'host_organization': None, 'host_organization_name': None, 'host_organization_lineage': [], 'host_organization_lineage_names': [], 'type': 'journal'}, 'license': None, 'license_id': None, 'version': None, 'is_accepted': False, 'is_published': False}, 'type': 'article', 'type_crossref': 'journal-article', 'indexed_in': ['crossref'], 'open_access': {'is_oa': False, 'oa_status': 'closed', 'oa_url': None, 'any_repository_has_fulltext': False}, 'authorships': [{'author_position': 'first', 'author': {'id': 'https://openalex.org/A5065386323', 'display_name': 'Akshay Bhardwaj', 'orcid': 'https://orcid.org/0000-0002-5261-3111'}, 'institutions': [], 'countries': [], 'is_corresponding': False, 'raw_author_name': 'Akshay BHARDWAJ', 'raw_affiliation_strings': [], 'affiliations': []}, {'author_position': 'middle', 'author': {'id': 'https://openalex.org/A5051746077', 'display_name': 'Kushagra Pandey', 'orcid': None}, 'institutions': [], 'countries': [], 'is_corresponding': False, 'raw_author_name': 'Kailash PANDEY', 'raw_affiliation_strings': [], 'affiliations': []}, {'author_position': 'last', 'author': {'id': 'https://openalex.org/A5077115970', 'display_name': 'Roopam CHOPRA', 'orcid': None}, 'institutions': [], 'countries': [], 'is_corresponding': False, 'raw_author_name': 'Roopam CHOPRA', 'raw_affiliation_strings': [], 'affiliations': []}], 'institution_assertions': [], 'countries_distinct_count': 0, 'institutions_distinct_count': 0, 'corresponding_author_ids': [], 'corresponding_institution_ids': [], 'apc_list': None, 'apc_paid': None, 'fwci': 0.251, 'has_fulltext': False, 'cited_by_count': 5, 'citation_normalized_percentile': {'value': 0.514455, 'is_in_top_1_percent': False, 'is_in_top_10_percent': False}, 'cited_by_percentile_year': {'min': 81, 'max': 83}, 'biblio': {'volume': '5', 'issue': '1', 'first_page': '32', 'last_page': '44'}, 'is_retracted': False, 'is_paratext': False, 'primary_topic': {'id': 'https://openalex.org/T12238', 'display_name': 'Energy Consumption in Mobile Devices and Networks', 'score': 0.9989, 'subfield': {'id': 'https://openalex.org/subfields/2208', 'display_name': 'Electrical and Electronic Engineering'}, 'field': {'id': 'https://openalex.org/fields/22', 'display_name': 'Engineering'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}, 'topics': [{'id': 'https://openalex.org/T12238', 'display_name': 'Energy Consumption in Mobile Devices and Networks', 'score': 0.9989, 'subfield': {'id': 'https://openalex.org/subfields/2208', 'display_name': 'Electrical and Electronic Engineering'}, 'field': {'id': 'https://openalex.org/fields/22', 'display_name': 'Engineering'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}, {'id': 'https://openalex.org/T11241', 'display_name': 'Characterization and Detection of Android Malware', 'score': 0.9987, 'subfield': {'id': 'https://openalex.org/subfields/1711', 'display_name': 'Signal Processing'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}, {'id': 'https://openalex.org/T11478', 'display_name': 'Content-Centric Networking for Information Delivery', 'score': 0.9758, 'subfield': {'id': 'https://openalex.org/subfields/1705', 'display_name': 'Computer Networks and Communications'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}], 'keywords': [{'id': 'https://openalex.org/keywords/security-analysis', 'display_name': 'Security Analysis', 'score': 0.630172}, {'id': 'https://openalex.org/keywords/iot-security', 'display_name': 'IoT Security', 'score': 0.573496}, {'id': 'https://openalex.org/keywords/android-malware', 'display_name': 'Android Malware', 'score': 0.554055}, {'id': 'https://openalex.org/keywords/smartphones', 'display_name': 'Smartphones', 'score': 0.522136}], 'concepts': [{'id': 'https://openalex.org/C557433098', 'wikidata': 'https://www.wikidata.org/wiki/Q94', 'display_name': 'Android (operating system)', 'level': 2, 'score': 0.70791626}, {'id': 'https://openalex.org/C41008148', 'wikidata': 'https://www.wikidata.org/wiki/Q21198', 'display_name': 'Computer science', 'level': 0, 'score': 0.57398486}, {'id': 'https://openalex.org/C38652104', 'wikidata': 'https://www.wikidata.org/wiki/Q3510521', 'display_name': 'Computer security', 'level': 1, 'score': 0.49959874}, {'id': 'https://openalex.org/C38369872', 'wikidata': 'https://www.wikidata.org/wiki/Q7445009', 'display_name': 'Security analysis', 'level': 2, 'score': 0.43757284}, {'id': 'https://openalex.org/C111919701', 'wikidata': 'https://www.wikidata.org/wiki/Q9135', 'display_name': 'Operating system', 'level': 1, 'score': 0.41095942}, {'id': 'https://openalex.org/C136764020', 'wikidata': 'https://www.wikidata.org/wiki/Q466', 'display_name': 'World Wide Web', 'level': 1, 'score': 0.40566257}], 'mesh': [], 'locations_count': 1, 'locations': [{'is_oa': False, 'landing_page_url': 'https://doi.org/10.19107/ijisc.2016.01.02', 'pdf_url': None, 'source': {'id': 'https://openalex.org/S4210229641', 'display_name': 'International Journal of Information Security and Cybercrime', 'issn_l': '2285-9225', 'issn': ['2285-9225', '2286-0096'], 'is_oa': False, 'is_in_doaj': False, 'is_core': False, 'host_organization': None, 'host_organization_name': None, 'host_organization_lineage': [], 'host_organization_lineage_names': [], 'type': 'journal'}, 'license': None, 'license_id': None, 'version': None, 'is_accepted': False, 'is_published': False}], 'best_oa_location': None, 'sustainable_development_goals': [], 'grants': [], 'datasets': [], 'versions': [], 'referenced_works_count': 6, 'referenced_works': ['https://openalex.org/W2060537671', 'https://openalex.org/W2106806833', 'https://openalex.org/W2166760478', 'https://openalex.org/W2297344328', 'https://openalex.org/W59191864', 'https://openalex.org/W78392500'], 'related_works': ['https://openalex.org/W589730254', 'https://openalex.org/W4241166160', 'https://openalex.org/W3134738208', 'https://openalex.org/W3096519538', 'https://openalex.org/W2748952813', 'https://openalex.org/W2744747300', 'https://openalex.org/W2418291489', 'https://openalex.org/W2165251242', 'https://openalex.org/W2068121105', 'https://openalex.org/W1565885216'], 'abstract_inverted_index': None, 'cited_by_api_url': 'https://api.openalex.org/works?filter=cites:W2489909539', 'counts_by_year': [{'year': 2022, 'cited_by_count': 2}, {'year': 2017, 'cited_by_count': 2}], 'updated_date': '2024-09-26T12:21:35.477956', 'created_date': '2016-08-23'}