Related references
Note: Only part of the references are listed.Android security assessment: A review, taxonomy and research gap study
Shivi Garg et al.
COMPUTERS & SECURITY (2021)
Mobile app privacy in software engineering research: A systematic mapping study
Fahimeh Ebrahimi et al.
INFORMATION AND SOFTWARE TECHNOLOGY (2021)
GDPR Compliance Assessment for Cross-Border Personal Data Transfers in Android Apps
Danny S. Guaman et al.
IEEE ACCESS (2021)
Machine Learning Algorithms for Smart Data Analysis in Internet of Things Environment: Taxonomies and Research Trends
Mohammed H. Alsharif et al.
SYMMETRY-BASEL (2020)
A Systematic Mapping Study on Software Quality Control Techniques for Assessing Privacy in Information Systems
Danny S. Guaman et al.
IEEE ACCESS (2020)
A Systematic Literature Review of Android Malware Detection Using Static Analysis
Ya Pan et al.
IEEE ACCESS (2020)
A Review of Android Malware Detection Approaches Based on Machine Learning
Kaijun Liu et al.
IEEE ACCESS (2020)
Automated Testing of Android Apps: A Systematic Literature Review
Pingfan Kong et al.
IEEE TRANSACTIONS ON RELIABILITY (2019)
A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software
Alireza Sadeghi et al.
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2017)
Static analysis of android apps: A systematic literature review
Li Li et al.
INFORMATION AND SOFTWARE TECHNOLOGY (2017)
Analyzing and automatically labelling the types of user issues that are raised in mobile app reviews
Stuart McIlroy et al.
EMPIRICAL SOFTWARE ENGINEERING (2016)
Guidelines for conducting systematic mapping studies in software engineering: An update
Kai Petersen et al.
INFORMATION AND SOFTWARE TECHNOLOGY (2015)
What is the best database for computer science journal articles?
Antonio Cavacini
SCIENTOMETRICS (2015)
Composite Constant Propagation: Application to Android Inter-Component Communication Analysis
Damien Octeau et al.
2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1 (2015)
IccTA: Detecting Inter-Component Privacy Leaks in Android Apps
Li Li et al.
2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1 (2015)
Protection Goals for Privacy Engineering
Marit Hansen et al.
2015 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW) (2015)
Can You Engineer Privacy?
Seda Gurses
COMMUNICATIONS OF THE ACM (2014)
Requirements engineering paper classification and evaluation criteria: a proposal and a discussion
R Wieringa et al.
REQUIREMENTS ENGINEERING (2006)