IoT-based green city architecture using secured and sustainable android services
Green and smart cities deliver services to their residents using mobile applications that make daily life more convenient. The privacy and security of these applications are significant in providing sustainable services in a green city. The software cloning is a severe threat which may breach the se...
Saved in:
| Published in: | Environmental technology & innovation Vol. 20; p. 101091 |
|---|---|
| Main Authors: | , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Elsevier B.V
01.11.2020
|
| Subjects: | |
| ISSN: | 2352-1864, 2352-1864 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Green and smart cities deliver services to their residents using mobile applications that make daily life more convenient. The privacy and security of these applications are significant in providing sustainable services in a green city. The software cloning is a severe threat which may breach the security and privacy of android applications. A centrally controlled and automated screening system across multiple app stores is inevitable to prevent the release of copyrighted or cloned copies of these apps. In this paper, we proposed IoT-enabled green city architecture for clone detection in android markets using a deep learning approach. First, the proposed system obtained an original APK file together with potential candidate cloned APKs via the cloud network. For each subject software, the system uses an APK Extractor tool to retrieve Dalvik Executable (DEX) files. The Jdex decompiler is utilized to retrieve Java source files through Dalvik Executables. Second, the AST features are extracted using ANother Tool for Language Recognition (ANTLR) parser. Third, the linear features are mined from these hierarchical structures, and Term Frequency Inverse Document Frequency (TFIDF) is applied to estimate the significance of each feature. Finally, the deep learning model is configured to detect cloned apps. The deep learning model is fine-tuned to get better accuracy. The proposed approach is analyzed on five different cloned applications collected from different android markets. The main objective of this system is to avoid the release of pirated apps with various pirated labels in multiple app markets.
•Proposed the IoT-based Green city architecture for security and sustainable services.•Extracting the abstract view features of android application using Abstract Syntax Tree.•Preventing the software clone attacks by investigating the structure of code.•TFIDF method is proposed to analyze the significance of each feature in terms of local and global weights.•Implementing the deep learning approach to investigate the similar code fragments in different mobile applications |
|---|---|
| AbstractList | Green and smart cities deliver services to their residents using mobile applications that make daily life more convenient. The privacy and security of these applications are significant in providing sustainable services in a green city. The software cloning is a severe threat which may breach the security and privacy of android applications. A centrally controlled and automated screening system across multiple app stores is inevitable to prevent the release of copyrighted or cloned copies of these apps. In this paper, we proposed IoT-enabled green city architecture for clone detection in android markets using a deep learning approach. First, the proposed system obtained an original APK file together with potential candidate cloned APKs via the cloud network. For each subject software, the system uses an APK Extractor tool to retrieve Dalvik Executable (DEX) files. The Jdex decompiler is utilized to retrieve Java source files through Dalvik Executables. Second, the AST features are extracted using ANother Tool for Language Recognition (ANTLR) parser. Third, the linear features are mined from these hierarchical structures, and Term Frequency Inverse Document Frequency (TFIDF) is applied to estimate the significance of each feature. Finally, the deep learning model is configured to detect cloned apps. The deep learning model is fine-tuned to get better accuracy. The proposed approach is analyzed on five different cloned applications collected from different android markets. The main objective of this system is to avoid the release of pirated apps with various pirated labels in multiple app markets. Green and smart cities deliver services to their residents using mobile applications that make daily life more convenient. The privacy and security of these applications are significant in providing sustainable services in a green city. The software cloning is a severe threat which may breach the security and privacy of android applications. A centrally controlled and automated screening system across multiple app stores is inevitable to prevent the release of copyrighted or cloned copies of these apps. In this paper, we proposed IoT-enabled green city architecture for clone detection in android markets using a deep learning approach. First, the proposed system obtained an original APK file together with potential candidate cloned APKs via the cloud network. For each subject software, the system uses an APK Extractor tool to retrieve Dalvik Executable (DEX) files. The Jdex decompiler is utilized to retrieve Java source files through Dalvik Executables. Second, the AST features are extracted using ANother Tool for Language Recognition (ANTLR) parser. Third, the linear features are mined from these hierarchical structures, and Term Frequency Inverse Document Frequency (TFIDF) is applied to estimate the significance of each feature. Finally, the deep learning model is configured to detect cloned apps. The deep learning model is fine-tuned to get better accuracy. The proposed approach is analyzed on five different cloned applications collected from different android markets. The main objective of this system is to avoid the release of pirated apps with various pirated labels in multiple app markets. •Proposed the IoT-based Green city architecture for security and sustainable services.•Extracting the abstract view features of android application using Abstract Syntax Tree.•Preventing the software clone attacks by investigating the structure of code.•TFIDF method is proposed to analyze the significance of each feature in terms of local and global weights.•Implementing the deep learning approach to investigate the similar code fragments in different mobile applications |
| ArticleNumber | 101091 |
| Author | Nayyar, Anand Al-Turjman, Fadi Ullah, Farhan |
| Author_xml | – sequence: 1 givenname: Farhan surname: Ullah fullname: Ullah, Farhan email: farhankhan.cs@yahoo.com organization: School of Software, Northwestern Polytechnical University, Beilin District, Xi’an Shaanxi, 710072, P.R. China – sequence: 2 givenname: Fadi surname: Al-Turjman fullname: Al-Turjman, Fadi email: Fadi.alturjman@neu.edu.tr organization: Artificial Intelligence Engineering Department, Research Centre for AI and IoT, Near East University, Nicosia, Mersin 10, Turkey – sequence: 3 givenname: Anand surname: Nayyar fullname: Nayyar, Anand email: anandnayyar@duytan.edu.vn organization: Graduate School, Duy Tan University, Da Nang 550000, Viet Nam |
| BookMark | eNp9kL1OwzAURi1UJErpA7BlZEnxdRInEROq-KlUCYYyW45zU1yldrGdSn17XMqAGDrZn_Ud695zTUbGGiTkFugMKPD7zQyDnjHKfjKt4YKMWVawFCqej_7cr8jU-w2llGVQ8IKPyfvCrtJGemyTtUM0idLhkEinPnVAFQaHyeC1WSceVQxtIk2b-MEHqY1sejxmZ3V8Q7fXCv0Nuexk73H6e07Ix_PTav6aLt9eFvPHZaqyjIa0jINWpQJVY12WUNAMJaiugbxuK-C8YU0JNavztuBSdRVlVVcUVcnylnasy7IJuTv9u3P2a0AfxFZ7hX0vDdrBC1aUecYrBhCrcKoqZ7132Imd01vpDgKoOAoUGxEFiqNAcRIYmfIfE8XIoK0JTur-LPlwIjFuv9fohFcajcJWu2hUtFafob8BrI-Lig |
| CitedBy_id | crossref_primary_10_1155_2022_3280928 crossref_primary_10_1002_int_22497 crossref_primary_10_1007_s11704_022_2050_4 crossref_primary_10_1002_int_22399 crossref_primary_10_1007_s13042_020_01246_9 crossref_primary_10_3390_su14053009 crossref_primary_10_1007_s40860_023_00202_y crossref_primary_10_1155_2022_8733919 crossref_primary_10_1109_JIOT_2023_3268325 crossref_primary_10_1108_JSTPM_03_2021_156 crossref_primary_10_1016_j_eti_2021_101443 crossref_primary_10_3846_tede_2022_16520 |
| Cites_doi | 10.1016/j.jclepro.2019.01.188 10.1016/j.future.2017.12.059 10.1145/3341105.3373867 10.1109/TC.2015.2470247 10.1016/j.comnet.2015.12.023 10.1016/j.scs.2017.12.012 10.1016/j.scs.2018.02.039 10.1016/j.scs.2017.12.022 10.1016/j.scs.2017.11.030 10.1109/TII.2014.2306799 10.1016/j.scs.2018.07.017 10.1145/2771783.2771795 10.1109/MWC.2016.7721744 10.1016/j.future.2017.08.006 10.4018/IJSWIS.2017010103 |
| ContentType | Journal Article |
| Copyright | 2020 Elsevier B.V. |
| Copyright_xml | – notice: 2020 Elsevier B.V. |
| DBID | AAYXX CITATION 7S9 L.6 |
| DOI | 10.1016/j.eti.2020.101091 |
| DatabaseName | CrossRef AGRICOLA AGRICOLA - Academic |
| DatabaseTitle | CrossRef AGRICOLA AGRICOLA - Academic |
| DatabaseTitleList | AGRICOLA |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2352-1864 |
| ExternalDocumentID | 10_1016_j_eti_2020_101091 S2352186420313912 |
| GroupedDBID | --M 0R~ 4.4 457 4G. 7-5 AACTN AAEDT AAEDW AAIAV AAKOC AALRI AAOAW AAXUO ABMAC ABYKQ ACDAQ ACGFS ACRLP ADBBV ADEZE AEBSH AFKWA AFPKN AFTJW AFXIZ AGHFR AGUBO AHEUO AIEXJ AIKHN AITUG AJBFU AJOXV AKIFW ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AXJTR BKOJK BLECG BLXMC EBS EFJIC EFLBG EJD FDB FIRID FYGXN GROUPED_DOAJ HZ~ KOM M41 M~E O9- OAUVE OK1 ROL SPCBC SSJ SSZ T5K ~G- AAFWJ AAHBH AATTM AAXKI AAYWO AAYXX ABJNI ACLOT ACVFH ADCNI ADVLN AEIPS AEUPX AFJKZ AFPUW AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS 7S9 L.6 |
| ID | FETCH-LOGICAL-c330t-710187c1c9e9771503ea1cfb149d8166b2b719294d56acf8028f558724d0f2f33 |
| ISICitedReferencesCount | 13 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000597138700009&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2352-1864 |
| IngestDate | Sun Sep 28 11:16:02 EDT 2025 Tue Nov 18 22:31:01 EST 2025 Wed Nov 12 18:37:32 EST 2025 Fri Feb 23 02:46:02 EST 2024 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Keywords | Deep learning Green city Mobile applications Internet of Things Abstract syntax tree |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c330t-710187c1c9e9771503ea1cfb149d8166b2b719294d56acf8028f558724d0f2f33 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
| PQID | 2574368211 |
| PQPubID | 24069 |
| ParticipantIDs | proquest_miscellaneous_2574368211 crossref_primary_10_1016_j_eti_2020_101091 crossref_citationtrail_10_1016_j_eti_2020_101091 elsevier_sciencedirect_doi_10_1016_j_eti_2020_101091 |
| PublicationCentury | 2000 |
| PublicationDate | November 2020 2020-11-00 20201101 |
| PublicationDateYYYYMMDD | 2020-11-01 |
| PublicationDate_xml | – month: 11 year: 2020 text: November 2020 |
| PublicationDecade | 2020 |
| PublicationTitle | Environmental technology & innovation |
| PublicationYear | 2020 |
| Publisher | Elsevier B.V |
| Publisher_xml | – name: Elsevier B.V |
| References | Sodhro, Pirbhulal, Luo, de Albuquerque (b33) 2019; 220 Pan, Kang (b25) 2011; 7 Parr (b26) 2013 Soh, Tan, Arnatovich, Wang (b34) 2015 Mbarek, B., Ge, M., Pitner, T., 2020. Enhanced network intrusion detection system protocol for internet of things. In: Proceedings of the 35th Annual ACM Symposium on Applied Computing, pp. 1156–1163. Kaur, Tomar, Singh (b15) 2018 Lorimer, Diec, Kantarci (b21) 2018; 38 Din, Paul, Hong, Seo (b9) 2019; 44 Kinawy, El-Diraby, Konomi (b17) 2018; 38 Nichols, Dewey, Emre, Chen, Hardekopf (b23) 2019 Rathore, Ahmad, Paul, Rho (b28) 2016; 101 Ghafir (b10) 2018 Abadi (b2) 2016 Wahler, Seipel, Wolff, Fischer (b37) 2004 Ullah (b36) 2019 Agostinelli, Hoffman, Sadowski, Baldi (b3) 2014 Su, Chuah, Tan (b35) 2012 Din, Paul (b8) 2019; 91 Paul, Ahmad, Rathore, Jabbar (b27) 2016; 23 Rathore, Paul, Ahmad, Chilamkurti, Hong, Seo (b29) 2018; 83 Yokoi, Choi, Yoshida, Inoue (b40) 2018 Rathore, Paul, Ahmad, Jeon (b30) 2017; 13 Butun, Österberg, Song (b5) 2019 Schleimer, Wilkerson, Aiken (b32) 2003 Wang, H., Guo, Y., Ma, Z., Chen, X., 2015. Wukong: A scalable and accurate two-phase approach to android app clone detection. In: Proceedings of the 2015 International Symposium on Software Testing and Analysis, pp. 71–82. Rathore, Paul, Hong, Seo, Awan, Saeed (b31) 2018; 40 Wang, Li, Ma, Xia, Jin (b39) 2020 Braun, Fung, Iqbal, Shah (b4) 2018; 39 Li, Dai, Ming, Qiu (b18) 2015; 65 Li (b19) 2017 Joshi, Khanna (b13) 2013; 68 Kang, Pang, Da Xu, Ma, Wang (b14) 2014; 10 Chin, Felt, Greenwood, Wagner (b6) 2011 Harrand, Soto-Valero, Monperrus, Baudry (b11) 2019 Liu, Chen, Han, Yu (b20) 2006 Crussell, Gibler, Chen (b7) 2013 Ojala, Ferm (b24) 2015 Zhou, Zhou, Jiang, Ning (b42) 2012 Jiang, Misherghi, Su, Glondu (b12) 2007 Abadi, M., et al., 2016a. Tensorflow: A system for large-scale machine learning. In: 12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16), pp. 265–283. Zhou, Wang, Zhou, Jiang (b41) 2012; 25 Ke, Jiang, Rui-Yun (b16) 2018 Ghafir (10.1016/j.eti.2020.101091_b10) 2018 Li (10.1016/j.eti.2020.101091_b18) 2015; 65 Chin (10.1016/j.eti.2020.101091_b6) 2011 10.1016/j.eti.2020.101091_b38 Nichols (10.1016/j.eti.2020.101091_b23) 2019 Ke (10.1016/j.eti.2020.101091_b16) 2018 Pan (10.1016/j.eti.2020.101091_b25) 2011; 7 Harrand (10.1016/j.eti.2020.101091_b11) 2019 Braun (10.1016/j.eti.2020.101091_b4) 2018; 39 Soh (10.1016/j.eti.2020.101091_b34) 2015 Lorimer (10.1016/j.eti.2020.101091_b21) 2018; 38 Rathore (10.1016/j.eti.2020.101091_b30) 2017; 13 Zhou (10.1016/j.eti.2020.101091_b42) 2012 Din (10.1016/j.eti.2020.101091_b9) 2019; 44 Kaur (10.1016/j.eti.2020.101091_b15) 2018 Kang (10.1016/j.eti.2020.101091_b14) 2014; 10 Parr (10.1016/j.eti.2020.101091_b26) 2013 Rathore (10.1016/j.eti.2020.101091_b31) 2018; 40 Yokoi (10.1016/j.eti.2020.101091_b40) 2018 Li (10.1016/j.eti.2020.101091_b19) 2017 Su (10.1016/j.eti.2020.101091_b35) 2012 Schleimer (10.1016/j.eti.2020.101091_b32) 2003 Rathore (10.1016/j.eti.2020.101091_b28) 2016; 101 Paul (10.1016/j.eti.2020.101091_b27) 2016; 23 Joshi (10.1016/j.eti.2020.101091_b13) 2013; 68 Liu (10.1016/j.eti.2020.101091_b20) 2006 Abadi (10.1016/j.eti.2020.101091_b2) 2016 10.1016/j.eti.2020.101091_b22 Agostinelli (10.1016/j.eti.2020.101091_b3) 2014 Kinawy (10.1016/j.eti.2020.101091_b17) 2018; 38 Ojala (10.1016/j.eti.2020.101091_b24) 2015 Butun (10.1016/j.eti.2020.101091_b5) 2019 Din (10.1016/j.eti.2020.101091_b8) 2019; 91 Rathore (10.1016/j.eti.2020.101091_b29) 2018; 83 10.1016/j.eti.2020.101091_b1 Wang (10.1016/j.eti.2020.101091_b39) 2020 Zhou (10.1016/j.eti.2020.101091_b41) 2012; 25 Crussell (10.1016/j.eti.2020.101091_b7) 2013 Sodhro (10.1016/j.eti.2020.101091_b33) 2019; 220 Jiang (10.1016/j.eti.2020.101091_b12) 2007 Wahler (10.1016/j.eti.2020.101091_b37) 2004 Ullah (10.1016/j.eti.2020.101091_b36) 2019 |
| References_xml | – reference: Wang, H., Guo, Y., Ma, Z., Chen, X., 2015. Wukong: A scalable and accurate two-phase approach to android app clone detection. In: Proceedings of the 2015 International Symposium on Software Testing and Analysis, pp. 71–82. – year: 2013 ident: b7 article-title: Scalable semantics-based detection of similar android applications publication-title: Proc. of ESORICS, vol. 13 – volume: 65 start-page: 1339 year: 2015 end-page: 1350 ident: b18 article-title: Privacy protection for preventing data over-collection in smart city publication-title: IEEE Trans. Comput. – volume: 10 start-page: 1516 year: 2014 end-page: 1526 ident: b14 article-title: An interactive trust model for application market of the internet of things publication-title: IEEE Trans. Ind. Inf. – volume: 13 start-page: 28 year: 2017 end-page: 47 ident: b30 article-title: IoT-Based big data: from smart city towards next generation super city planning publication-title: Int. J. Semant. Web Inf. Syst. (IJSWIS) – start-page: 163 year: 2015 end-page: 173 ident: b34 article-title: Detecting clones in android applications through analyzing user interfaces publication-title: Proceedings of the 2015 IEEE 23rd International Conference on Program Comprehension – start-page: 699 year: 2018 end-page: 700 ident: b40 article-title: Investigating vector-based detection of code clones using bigclonebench publication-title: 2018 25th Asia-Pacific Software Engineering Conference (APSEC) – start-page: 92 year: 2019 end-page: 102 ident: b11 article-title: The strengths and behavioral quirks of java bytecode decompilers publication-title: 2019 19th International Working Conference on Source Code Analysis and Manipulation (SCAM) – year: 2013 ident: b26 article-title: The Definitive ANTLR 4 Reference – start-page: 315 year: 2018 end-page: 333 ident: b15 article-title: Design of cloud-based green iot architecture for smart cities publication-title: Internet of Things and Big Data Analytics Toward Next-Generation Intelligence – start-page: e379 year: 2019 ident: b36 article-title: Detection of clone scammers in android markets using IoT-based edge computing publication-title: Trans. Emerg. Telecommun. Technol. – start-page: 76 year: 2003 end-page: 85 ident: b32 article-title: Winnowing: local algorithms for document fingerprinting publication-title: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data – start-page: 1 year: 2018 end-page: 17 ident: b10 article-title: Security threats to critical infrastructure: the human factor publication-title: J. Supercomput. – volume: 83 start-page: 638 year: 2018 end-page: 652 ident: b29 article-title: Real-time secure communication for smart city in high-speed big data environment publication-title: Future Gener. Comput. Syst. – year: 2014 ident: b3 article-title: Learning activation functions to improve deep neural networks – start-page: 153 year: 2012 end-page: 160 ident: b35 article-title: Smartphone dual defense protection framework: Detecting malicious applications in android markets publication-title: 2012 8th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN) – volume: 68 start-page: 17 year: 2013 end-page: 20 ident: b13 article-title: Plagiarism detection over the web publication-title: Int. J. Comput. Appl. – volume: 23 start-page: 68 year: 2016 end-page: 74 ident: b27 article-title: Smartbuddy: defining human behaviors using big data analytics in social internet of things publication-title: IEEE Wirel. Commun. – volume: 38 start-page: 286 year: 2018 end-page: 300 ident: b17 article-title: Customizing information delivery to project stakeholders in the smart city publication-title: Sustain. Cities Soc. – volume: 101 start-page: 63 year: 2016 end-page: 80 ident: b28 article-title: Urban planning and building smart cities based on the internet of things using big data analytics publication-title: Comput. Netw. – start-page: 317 year: 2012 end-page: 326 ident: b42 article-title: Detecting repackaged smartphone applications in third-party android marketplaces publication-title: Proceedings of the Second ACM Conference on Data and Application Security and Privacy – start-page: 872 year: 2006 end-page: 881 ident: b20 article-title: GPLAG: detection of software plagiarism by program dependence graph analysis publication-title: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining – start-page: 335 year: 2017 end-page: 346 ident: b19 article-title: LibD: scalable and precise third-party library detection in android markets publication-title: 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE) – volume: 7 year: 2011 ident: b25 article-title: Research on examination paper recognizing and importing system based on ANTLR publication-title: Electron. Des. Eng. – start-page: 239 year: 2011 end-page: 252 ident: b6 article-title: Analyzing inter-application communication in android publication-title: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services – start-page: 96 year: 2007 end-page: 105 ident: b12 article-title: Deckard: Scalable and accurate tree-based detection of code clones publication-title: Proceedings of the 29th International Conference on Software Engineering – reference: Mbarek, B., Ge, M., Pitner, T., 2020. Enhanced network intrusion detection system protocol for internet of things. In: Proceedings of the 35th Annual ACM Symposium on Applied Computing, pp. 1156–1163. – volume: 25 start-page: 50 year: 2012 end-page: 52 ident: b41 article-title: Hey, you, get off of my market: detecting malicious apps in official and alternative android markets publication-title: NDSS – volume: 39 start-page: 499 year: 2018 end-page: 507 ident: b4 article-title: Security and privacy challenges in smart cities publication-title: Sustain. Cities Soc. – volume: 91 start-page: 611 year: 2019 end-page: 619 ident: b8 article-title: Smart health monitoring and management system: Toward autonomous wearable sensing for internet of things using big data analytics publication-title: Future Gener. Comput. Syst. – volume: 44 start-page: 144 year: 2019 end-page: 151 ident: b9 article-title: Constrained application for mobility management using embedded devices in the Internet of Things based urban planning in smart cities publication-title: Sustainable Cities Soc. – volume: 220 start-page: 1167 year: 2019 end-page: 1179 ident: b33 article-title: Towards an optimal resource management for IoT based green and sustainable smart cities publication-title: J. Cleaner Prod. – start-page: 128 year: 2004 end-page: 135 ident: b37 article-title: Clone detection in source code by frequent itemset techniques publication-title: Source Code Analysis and Manipulation, Fourth IEEE International Workshop on – year: 2019 ident: b5 article-title: Security of the internet of things: vulnerabilities, attacks and countermeasures publication-title: IEEE Commun. Surv. Tutor. – year: 2018 ident: b16 article-title: A code classification method based on TF-IDF publication-title: DEStech Trans. Econ. Bus. Manag. – start-page: 261 year: 2020 end-page: 271 ident: b39 article-title: Detecting code clones with graph neural network and flow-augmented abstract syntax tree publication-title: 2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER) – start-page: 555 year: 2019 end-page: 561 ident: b23 article-title: Syntax-based improvements to plagiarism detectors and their evaluations publication-title: Proceedings of the 2019 ACM Conference on Innovation and Technology in Computer Science Education – volume: 40 start-page: 600 year: 2018 end-page: 610 ident: b31 article-title: Exploiting iot and big data analytics: Defining smart digital city using real-time urban data publication-title: Sustain. Cities Soc. – reference: Abadi, M., et al., 2016a. Tensorflow: A system for large-scale machine learning. In: 12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16), pp. 265–283. – year: 2016 ident: b2 article-title: Tensorflow: Large-scale machine learning on heterogeneous distributed systems – start-page: 1 year: 2015 end-page: 8 ident: b24 article-title: Building green city with green choices in traffic publication-title: EChallenges E-2015 Conference – volume: 38 start-page: 348 year: 2018 end-page: 358 ident: b21 article-title: COVERS-UP: Collaborative verification of smart user profiles for social sustainability of smart cities publication-title: Sustain. Cities Soc. – volume: 220 start-page: 1167 year: 2019 ident: 10.1016/j.eti.2020.101091_b33 article-title: Towards an optimal resource management for IoT based green and sustainable smart cities publication-title: J. Cleaner Prod. doi: 10.1016/j.jclepro.2019.01.188 – volume: 25 start-page: 50 issue: 4 year: 2012 ident: 10.1016/j.eti.2020.101091_b41 article-title: Hey, you, get off of my market: detecting malicious apps in official and alternative android markets publication-title: NDSS – start-page: 872 year: 2006 ident: 10.1016/j.eti.2020.101091_b20 article-title: GPLAG: detection of software plagiarism by program dependence graph analysis – start-page: 76 year: 2003 ident: 10.1016/j.eti.2020.101091_b32 article-title: Winnowing: local algorithms for document fingerprinting – start-page: 555 year: 2019 ident: 10.1016/j.eti.2020.101091_b23 article-title: Syntax-based improvements to plagiarism detectors and their evaluations – start-page: e379 year: 2019 ident: 10.1016/j.eti.2020.101091_b36 article-title: Detection of clone scammers in android markets using IoT-based edge computing publication-title: Trans. Emerg. Telecommun. Technol. – volume: 91 start-page: 611 year: 2019 ident: 10.1016/j.eti.2020.101091_b8 article-title: Smart health monitoring and management system: Toward autonomous wearable sensing for internet of things using big data analytics publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2017.12.059 – ident: 10.1016/j.eti.2020.101091_b22 doi: 10.1145/3341105.3373867 – volume: 65 start-page: 1339 issue: 5 year: 2015 ident: 10.1016/j.eti.2020.101091_b18 article-title: Privacy protection for preventing data over-collection in smart city publication-title: IEEE Trans. Comput. doi: 10.1109/TC.2015.2470247 – start-page: 96 year: 2007 ident: 10.1016/j.eti.2020.101091_b12 article-title: Deckard: Scalable and accurate tree-based detection of code clones – start-page: 92 year: 2019 ident: 10.1016/j.eti.2020.101091_b11 article-title: The strengths and behavioral quirks of java bytecode decompilers – start-page: 315 year: 2018 ident: 10.1016/j.eti.2020.101091_b15 article-title: Design of cloud-based green iot architecture for smart cities – year: 2018 ident: 10.1016/j.eti.2020.101091_b16 article-title: A code classification method based on TF-IDF publication-title: DEStech Trans. Econ. Bus. Manag. – year: 2013 ident: 10.1016/j.eti.2020.101091_b7 article-title: Scalable semantics-based detection of similar android applications – volume: 101 start-page: 63 year: 2016 ident: 10.1016/j.eti.2020.101091_b28 article-title: Urban planning and building smart cities based on the internet of things using big data analytics publication-title: Comput. Netw. doi: 10.1016/j.comnet.2015.12.023 – start-page: 1 year: 2018 ident: 10.1016/j.eti.2020.101091_b10 article-title: Security threats to critical infrastructure: the human factor publication-title: J. Supercomput. – volume: 38 start-page: 286 year: 2018 ident: 10.1016/j.eti.2020.101091_b17 article-title: Customizing information delivery to project stakeholders in the smart city publication-title: Sustain. Cities Soc. doi: 10.1016/j.scs.2017.12.012 – start-page: 163 year: 2015 ident: 10.1016/j.eti.2020.101091_b34 article-title: Detecting clones in android applications through analyzing user interfaces – volume: 7 year: 2011 ident: 10.1016/j.eti.2020.101091_b25 article-title: Research on examination paper recognizing and importing system based on ANTLR publication-title: Electron. Des. Eng. – start-page: 317 year: 2012 ident: 10.1016/j.eti.2020.101091_b42 article-title: Detecting repackaged smartphone applications in third-party android marketplaces – year: 2014 ident: 10.1016/j.eti.2020.101091_b3 – year: 2013 ident: 10.1016/j.eti.2020.101091_b26 – start-page: 239 year: 2011 ident: 10.1016/j.eti.2020.101091_b6 article-title: Analyzing inter-application communication in android – start-page: 335 year: 2017 ident: 10.1016/j.eti.2020.101091_b19 article-title: LibD: scalable and precise third-party library detection in android markets – start-page: 1 year: 2015 ident: 10.1016/j.eti.2020.101091_b24 article-title: Building green city with green choices in traffic – volume: 39 start-page: 499 year: 2018 ident: 10.1016/j.eti.2020.101091_b4 article-title: Security and privacy challenges in smart cities publication-title: Sustain. Cities Soc. doi: 10.1016/j.scs.2018.02.039 – year: 2019 ident: 10.1016/j.eti.2020.101091_b5 article-title: Security of the internet of things: vulnerabilities, attacks and countermeasures publication-title: IEEE Commun. Surv. Tutor. – volume: 40 start-page: 600 year: 2018 ident: 10.1016/j.eti.2020.101091_b31 article-title: Exploiting iot and big data analytics: Defining smart digital city using real-time urban data publication-title: Sustain. Cities Soc. doi: 10.1016/j.scs.2017.12.022 – volume: 68 start-page: 17 issue: 15 year: 2013 ident: 10.1016/j.eti.2020.101091_b13 article-title: Plagiarism detection over the web publication-title: Int. J. Comput. Appl. – volume: 38 start-page: 348 year: 2018 ident: 10.1016/j.eti.2020.101091_b21 article-title: COVERS-UP: Collaborative verification of smart user profiles for social sustainability of smart cities publication-title: Sustain. Cities Soc. doi: 10.1016/j.scs.2017.11.030 – start-page: 153 year: 2012 ident: 10.1016/j.eti.2020.101091_b35 article-title: Smartphone dual defense protection framework: Detecting malicious applications in android markets – volume: 10 start-page: 1516 issue: 2 year: 2014 ident: 10.1016/j.eti.2020.101091_b14 article-title: An interactive trust model for application market of the internet of things publication-title: IEEE Trans. Ind. Inf. doi: 10.1109/TII.2014.2306799 – year: 2016 ident: 10.1016/j.eti.2020.101091_b2 – volume: 44 start-page: 144 year: 2019 ident: 10.1016/j.eti.2020.101091_b9 article-title: Constrained application for mobility management using embedded devices in the Internet of Things based urban planning in smart cities publication-title: Sustainable Cities Soc. doi: 10.1016/j.scs.2018.07.017 – ident: 10.1016/j.eti.2020.101091_b38 doi: 10.1145/2771783.2771795 – volume: 23 start-page: 68 issue: 5 year: 2016 ident: 10.1016/j.eti.2020.101091_b27 article-title: Smartbuddy: defining human behaviors using big data analytics in social internet of things publication-title: IEEE Wirel. Commun. doi: 10.1109/MWC.2016.7721744 – start-page: 128 year: 2004 ident: 10.1016/j.eti.2020.101091_b37 article-title: Clone detection in source code by frequent itemset techniques – ident: 10.1016/j.eti.2020.101091_b1 – start-page: 699 year: 2018 ident: 10.1016/j.eti.2020.101091_b40 article-title: Investigating vector-based detection of code clones using bigclonebench – start-page: 261 year: 2020 ident: 10.1016/j.eti.2020.101091_b39 article-title: Detecting code clones with graph neural network and flow-augmented abstract syntax tree – volume: 83 start-page: 638 year: 2018 ident: 10.1016/j.eti.2020.101091_b29 article-title: Real-time secure communication for smart city in high-speed big data environment publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2017.08.006 – volume: 13 start-page: 28 issue: 1 year: 2017 ident: 10.1016/j.eti.2020.101091_b30 article-title: IoT-Based big data: from smart city towards next generation super city planning publication-title: Int. J. Semant. Web Inf. Syst. (IJSWIS) doi: 10.4018/IJSWIS.2017010103 |
| SSID | ssj0002315656 |
| Score | 2.2912436 |
| Snippet | Green and smart cities deliver services to their residents using mobile applications that make daily life more convenient. The privacy and security of these... |
| SourceID | proquest crossref elsevier |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 101091 |
| SubjectTerms | Abstract syntax tree cities clones computer software Deep learning environmental technology Green city Internet of Things Mobile applications screening |
| Title | IoT-based green city architecture using secured and sustainable android services |
| URI | https://dx.doi.org/10.1016/j.eti.2020.101091 https://www.proquest.com/docview/2574368211 |
| Volume | 20 |
| WOSCitedRecordID | wos000597138700009&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 2352-1864 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002315656 issn: 2352-1864 databaseCode: AIEXJ dateStart: 20140601 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2352-1864 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002315656 issn: 2352-1864 databaseCode: M~E dateStart: 20140101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lj9MwELbQwgEOiKdYFpCROFGlip2kTo4VooIDq5XoSnuzXD8g1SpdNS3avfDbd8Z20sfCCpC4RJWVONXMl_E34_EMIe8ybUdc6SLRGbNJLkZVMktdkZiSW5H7EnC5bzYhjo_Ls7PqJKbytr6dgGia8vKyuvivqoYxUDYenf0LdfeTwgD8BqXDFdQO1z9S_OfFNMG1yQy-YU7NQCPP3tkvWPv4QIuRdusrtQ7arWNUCksY1DAWrchO7H5zLA6T1PuwvAdQ3TdY7bR4ChjzYZuJWn7fwHB8nkzXy3mMvU6UqfuQtLq6Chnf4ya0FulDEuB_sp2QxM2zMmjOOFC9hJWhZvnQ_mIs2mN_OO6maQ9RhvnQruohvhRH0tDpa69i9lecFmflWJiywh7Ud7koKjR6X35uQnBAbZHO-vaD8X90-94-A3DvTb9jLntruCcm00fkYfQo6Dgg4TG5Y5sn5MFWncmn5KTHBPWYoIgJuo0J6jFBIyYoyJ5uYYJGTNAOE8_I6eTj9MOnJLbSgG8wS1eYcctKoZmuLBB-cAIyq5h2M_CPDe4cz_hMANevclOMlHYlsE5XFKXguUkdd1n2nBw0i8a-wFw45XKhTKYFOOOirETqmDM53M8qY9ghSTsxSR3rzGO7k3PZJRTOJUhWomRlkOwhed8_chGKrNx2c97JXkaWGNifBKTc9tjbTk8SLChui6nGLtathEUL2zBwxl7-29RH5P7mK3hFDlbLtX1N7ukfq7pdvvGYuwZ5r5Vk |
| linkProvider | ISSN International Centre |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=IoT-based+green+city+architecture+using+secured+and+sustainable+android+services&rft.jtitle=Environmental+technology+%26+innovation&rft.au=Ullah%2C+Farhan&rft.au=Al-Turjman%2C+Fadi&rft.au=Nayyar%2C+Anand&rft.date=2020-11-01&rft.pub=Elsevier+B.V&rft.issn=2352-1864&rft.eissn=2352-1864&rft.volume=20&rft_id=info:doi/10.1016%2Fj.eti.2020.101091&rft.externalDocID=S2352186420313912 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2352-1864&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2352-1864&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2352-1864&client=summon |