IoT-based green city architecture using secured and sustainable android services

Green and smart cities deliver services to their residents using mobile applications that make daily life more convenient. The privacy and security of these applications are significant in providing sustainable services in a green city. The software cloning is a severe threat which may breach the se...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Environmental technology & innovation Ročník 20; s. 101091
Hlavní autori: Ullah, Farhan, Al-Turjman, Fadi, Nayyar, Anand
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Elsevier B.V 01.11.2020
Predmet:
ISSN:2352-1864, 2352-1864
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Green and smart cities deliver services to their residents using mobile applications that make daily life more convenient. The privacy and security of these applications are significant in providing sustainable services in a green city. The software cloning is a severe threat which may breach the security and privacy of android applications. A centrally controlled and automated screening system across multiple app stores is inevitable to prevent the release of copyrighted or cloned copies of these apps. In this paper, we proposed IoT-enabled green city architecture for clone detection in android markets using a deep learning approach. First, the proposed system obtained an original APK file together with potential candidate cloned APKs via the cloud network. For each subject software, the system uses an APK Extractor tool to retrieve Dalvik Executable (DEX) files. The Jdex decompiler is utilized to retrieve Java source files through Dalvik Executables. Second, the AST features are extracted using ANother Tool for Language Recognition (ANTLR) parser. Third, the linear features are mined from these hierarchical structures, and Term Frequency Inverse Document Frequency (TFIDF) is applied to estimate the significance of each feature. Finally, the deep learning model is configured to detect cloned apps. The deep learning model is fine-tuned to get better accuracy. The proposed approach is analyzed on five different cloned applications collected from different android markets. The main objective of this system is to avoid the release of pirated apps with various pirated labels in multiple app markets. •Proposed the IoT-based Green city architecture for security and sustainable services.•Extracting the abstract view features of android application using Abstract Syntax Tree.•Preventing the software clone attacks by investigating the structure of code.•TFIDF method is proposed to analyze the significance of each feature in terms of local and global weights.•Implementing the deep learning approach to investigate the similar code fragments in different mobile applications
AbstractList Green and smart cities deliver services to their residents using mobile applications that make daily life more convenient. The privacy and security of these applications are significant in providing sustainable services in a green city. The software cloning is a severe threat which may breach the security and privacy of android applications. A centrally controlled and automated screening system across multiple app stores is inevitable to prevent the release of copyrighted or cloned copies of these apps. In this paper, we proposed IoT-enabled green city architecture for clone detection in android markets using a deep learning approach. First, the proposed system obtained an original APK file together with potential candidate cloned APKs via the cloud network. For each subject software, the system uses an APK Extractor tool to retrieve Dalvik Executable (DEX) files. The Jdex decompiler is utilized to retrieve Java source files through Dalvik Executables. Second, the AST features are extracted using ANother Tool for Language Recognition (ANTLR) parser. Third, the linear features are mined from these hierarchical structures, and Term Frequency Inverse Document Frequency (TFIDF) is applied to estimate the significance of each feature. Finally, the deep learning model is configured to detect cloned apps. The deep learning model is fine-tuned to get better accuracy. The proposed approach is analyzed on five different cloned applications collected from different android markets. The main objective of this system is to avoid the release of pirated apps with various pirated labels in multiple app markets.
Green and smart cities deliver services to their residents using mobile applications that make daily life more convenient. The privacy and security of these applications are significant in providing sustainable services in a green city. The software cloning is a severe threat which may breach the security and privacy of android applications. A centrally controlled and automated screening system across multiple app stores is inevitable to prevent the release of copyrighted or cloned copies of these apps. In this paper, we proposed IoT-enabled green city architecture for clone detection in android markets using a deep learning approach. First, the proposed system obtained an original APK file together with potential candidate cloned APKs via the cloud network. For each subject software, the system uses an APK Extractor tool to retrieve Dalvik Executable (DEX) files. The Jdex decompiler is utilized to retrieve Java source files through Dalvik Executables. Second, the AST features are extracted using ANother Tool for Language Recognition (ANTLR) parser. Third, the linear features are mined from these hierarchical structures, and Term Frequency Inverse Document Frequency (TFIDF) is applied to estimate the significance of each feature. Finally, the deep learning model is configured to detect cloned apps. The deep learning model is fine-tuned to get better accuracy. The proposed approach is analyzed on five different cloned applications collected from different android markets. The main objective of this system is to avoid the release of pirated apps with various pirated labels in multiple app markets. •Proposed the IoT-based Green city architecture for security and sustainable services.•Extracting the abstract view features of android application using Abstract Syntax Tree.•Preventing the software clone attacks by investigating the structure of code.•TFIDF method is proposed to analyze the significance of each feature in terms of local and global weights.•Implementing the deep learning approach to investigate the similar code fragments in different mobile applications
ArticleNumber 101091
Author Nayyar, Anand
Al-Turjman, Fadi
Ullah, Farhan
Author_xml – sequence: 1
  givenname: Farhan
  surname: Ullah
  fullname: Ullah, Farhan
  email: farhankhan.cs@yahoo.com
  organization: School of Software, Northwestern Polytechnical University, Beilin District, Xi’an Shaanxi, 710072, P.R. China
– sequence: 2
  givenname: Fadi
  surname: Al-Turjman
  fullname: Al-Turjman, Fadi
  email: Fadi.alturjman@neu.edu.tr
  organization: Artificial Intelligence Engineering Department, Research Centre for AI and IoT, Near East University, Nicosia, Mersin 10, Turkey
– sequence: 3
  givenname: Anand
  surname: Nayyar
  fullname: Nayyar, Anand
  email: anandnayyar@duytan.edu.vn
  organization: Graduate School, Duy Tan University, Da Nang 550000, Viet Nam
BookMark eNp9kL1OwzAURi1UJErpA7BlZEnxdRInEROq-KlUCYYyW45zU1yldrGdSn17XMqAGDrZn_Ud695zTUbGGiTkFugMKPD7zQyDnjHKfjKt4YKMWVawFCqej_7cr8jU-w2llGVQ8IKPyfvCrtJGemyTtUM0idLhkEinPnVAFQaHyeC1WSceVQxtIk2b-MEHqY1sejxmZ3V8Q7fXCv0Nuexk73H6e07Ix_PTav6aLt9eFvPHZaqyjIa0jINWpQJVY12WUNAMJaiugbxuK-C8YU0JNavztuBSdRVlVVcUVcnylnasy7IJuTv9u3P2a0AfxFZ7hX0vDdrBC1aUecYrBhCrcKoqZ7132Imd01vpDgKoOAoUGxEFiqNAcRIYmfIfE8XIoK0JTur-LPlwIjFuv9fohFcajcJWu2hUtFafob8BrI-Lig
CitedBy_id crossref_primary_10_1155_2022_3280928
crossref_primary_10_1002_int_22497
crossref_primary_10_1007_s11704_022_2050_4
crossref_primary_10_1002_int_22399
crossref_primary_10_1007_s13042_020_01246_9
crossref_primary_10_3390_su14053009
crossref_primary_10_1007_s40860_023_00202_y
crossref_primary_10_1155_2022_8733919
crossref_primary_10_1109_JIOT_2023_3268325
crossref_primary_10_1108_JSTPM_03_2021_156
crossref_primary_10_1016_j_eti_2021_101443
crossref_primary_10_3846_tede_2022_16520
Cites_doi 10.1016/j.jclepro.2019.01.188
10.1016/j.future.2017.12.059
10.1145/3341105.3373867
10.1109/TC.2015.2470247
10.1016/j.comnet.2015.12.023
10.1016/j.scs.2017.12.012
10.1016/j.scs.2018.02.039
10.1016/j.scs.2017.12.022
10.1016/j.scs.2017.11.030
10.1109/TII.2014.2306799
10.1016/j.scs.2018.07.017
10.1145/2771783.2771795
10.1109/MWC.2016.7721744
10.1016/j.future.2017.08.006
10.4018/IJSWIS.2017010103
ContentType Journal Article
Copyright 2020 Elsevier B.V.
Copyright_xml – notice: 2020 Elsevier B.V.
DBID AAYXX
CITATION
7S9
L.6
DOI 10.1016/j.eti.2020.101091
DatabaseName CrossRef
AGRICOLA
AGRICOLA - Academic
DatabaseTitle CrossRef
AGRICOLA
AGRICOLA - Academic
DatabaseTitleList AGRICOLA

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2352-1864
ExternalDocumentID 10_1016_j_eti_2020_101091
S2352186420313912
GroupedDBID --M
0R~
4.4
457
4G.
7-5
AACTN
AAEDT
AAEDW
AAIAV
AAKOC
AALRI
AAOAW
AAXUO
ABMAC
ABYKQ
ACDAQ
ACGFS
ACRLP
ADBBV
ADEZE
AEBSH
AFKWA
AFPKN
AFTJW
AFXIZ
AGHFR
AGUBO
AHEUO
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
AKIFW
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AXJTR
BKOJK
BLECG
BLXMC
EBS
EFJIC
EFLBG
EJD
FDB
FIRID
FYGXN
GROUPED_DOAJ
HZ~
KOM
M41
M~E
O9-
OAUVE
OK1
ROL
SPCBC
SSJ
SSZ
T5K
~G-
AAFWJ
AAHBH
AATTM
AAXKI
AAYWO
AAYXX
ABJNI
ACLOT
ACVFH
ADCNI
ADVLN
AEIPS
AEUPX
AFJKZ
AFPUW
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
7S9
L.6
ID FETCH-LOGICAL-c330t-710187c1c9e9771503ea1cfb149d8166b2b719294d56acf8028f558724d0f2f33
ISICitedReferencesCount 13
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000597138700009&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2352-1864
IngestDate Sun Sep 28 11:16:02 EDT 2025
Tue Nov 18 22:31:01 EST 2025
Wed Nov 12 18:37:32 EST 2025
Fri Feb 23 02:46:02 EST 2024
IsPeerReviewed false
IsScholarly true
Keywords Deep learning
Green city
Mobile applications
Internet of Things
Abstract syntax tree
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c330t-710187c1c9e9771503ea1cfb149d8166b2b719294d56acf8028f558724d0f2f33
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
PQID 2574368211
PQPubID 24069
ParticipantIDs proquest_miscellaneous_2574368211
crossref_primary_10_1016_j_eti_2020_101091
crossref_citationtrail_10_1016_j_eti_2020_101091
elsevier_sciencedirect_doi_10_1016_j_eti_2020_101091
PublicationCentury 2000
PublicationDate November 2020
2020-11-00
20201101
PublicationDateYYYYMMDD 2020-11-01
PublicationDate_xml – month: 11
  year: 2020
  text: November 2020
PublicationDecade 2020
PublicationTitle Environmental technology & innovation
PublicationYear 2020
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Sodhro, Pirbhulal, Luo, de Albuquerque (b33) 2019; 220
Pan, Kang (b25) 2011; 7
Parr (b26) 2013
Soh, Tan, Arnatovich, Wang (b34) 2015
Mbarek, B., Ge, M., Pitner, T., 2020. Enhanced network intrusion detection system protocol for internet of things. In: Proceedings of the 35th Annual ACM Symposium on Applied Computing, pp. 1156–1163.
Kaur, Tomar, Singh (b15) 2018
Lorimer, Diec, Kantarci (b21) 2018; 38
Din, Paul, Hong, Seo (b9) 2019; 44
Kinawy, El-Diraby, Konomi (b17) 2018; 38
Nichols, Dewey, Emre, Chen, Hardekopf (b23) 2019
Rathore, Ahmad, Paul, Rho (b28) 2016; 101
Ghafir (b10) 2018
Abadi (b2) 2016
Wahler, Seipel, Wolff, Fischer (b37) 2004
Ullah (b36) 2019
Agostinelli, Hoffman, Sadowski, Baldi (b3) 2014
Su, Chuah, Tan (b35) 2012
Din, Paul (b8) 2019; 91
Paul, Ahmad, Rathore, Jabbar (b27) 2016; 23
Rathore, Paul, Ahmad, Chilamkurti, Hong, Seo (b29) 2018; 83
Yokoi, Choi, Yoshida, Inoue (b40) 2018
Rathore, Paul, Ahmad, Jeon (b30) 2017; 13
Butun, Österberg, Song (b5) 2019
Schleimer, Wilkerson, Aiken (b32) 2003
Wang, H., Guo, Y., Ma, Z., Chen, X., 2015. Wukong: A scalable and accurate two-phase approach to android app clone detection. In: Proceedings of the 2015 International Symposium on Software Testing and Analysis, pp. 71–82.
Rathore, Paul, Hong, Seo, Awan, Saeed (b31) 2018; 40
Wang, Li, Ma, Xia, Jin (b39) 2020
Braun, Fung, Iqbal, Shah (b4) 2018; 39
Li, Dai, Ming, Qiu (b18) 2015; 65
Li (b19) 2017
Joshi, Khanna (b13) 2013; 68
Kang, Pang, Da Xu, Ma, Wang (b14) 2014; 10
Chin, Felt, Greenwood, Wagner (b6) 2011
Harrand, Soto-Valero, Monperrus, Baudry (b11) 2019
Liu, Chen, Han, Yu (b20) 2006
Crussell, Gibler, Chen (b7) 2013
Ojala, Ferm (b24) 2015
Zhou, Zhou, Jiang, Ning (b42) 2012
Jiang, Misherghi, Su, Glondu (b12) 2007
Abadi, M., et al., 2016a. Tensorflow: A system for large-scale machine learning. In: 12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16), pp. 265–283.
Zhou, Wang, Zhou, Jiang (b41) 2012; 25
Ke, Jiang, Rui-Yun (b16) 2018
Ghafir (10.1016/j.eti.2020.101091_b10) 2018
Li (10.1016/j.eti.2020.101091_b18) 2015; 65
Chin (10.1016/j.eti.2020.101091_b6) 2011
10.1016/j.eti.2020.101091_b38
Nichols (10.1016/j.eti.2020.101091_b23) 2019
Ke (10.1016/j.eti.2020.101091_b16) 2018
Pan (10.1016/j.eti.2020.101091_b25) 2011; 7
Harrand (10.1016/j.eti.2020.101091_b11) 2019
Braun (10.1016/j.eti.2020.101091_b4) 2018; 39
Soh (10.1016/j.eti.2020.101091_b34) 2015
Lorimer (10.1016/j.eti.2020.101091_b21) 2018; 38
Rathore (10.1016/j.eti.2020.101091_b30) 2017; 13
Zhou (10.1016/j.eti.2020.101091_b42) 2012
Din (10.1016/j.eti.2020.101091_b9) 2019; 44
Kaur (10.1016/j.eti.2020.101091_b15) 2018
Kang (10.1016/j.eti.2020.101091_b14) 2014; 10
Parr (10.1016/j.eti.2020.101091_b26) 2013
Rathore (10.1016/j.eti.2020.101091_b31) 2018; 40
Yokoi (10.1016/j.eti.2020.101091_b40) 2018
Li (10.1016/j.eti.2020.101091_b19) 2017
Su (10.1016/j.eti.2020.101091_b35) 2012
Schleimer (10.1016/j.eti.2020.101091_b32) 2003
Rathore (10.1016/j.eti.2020.101091_b28) 2016; 101
Paul (10.1016/j.eti.2020.101091_b27) 2016; 23
Joshi (10.1016/j.eti.2020.101091_b13) 2013; 68
Liu (10.1016/j.eti.2020.101091_b20) 2006
Abadi (10.1016/j.eti.2020.101091_b2) 2016
10.1016/j.eti.2020.101091_b22
Agostinelli (10.1016/j.eti.2020.101091_b3) 2014
Kinawy (10.1016/j.eti.2020.101091_b17) 2018; 38
Ojala (10.1016/j.eti.2020.101091_b24) 2015
Butun (10.1016/j.eti.2020.101091_b5) 2019
Din (10.1016/j.eti.2020.101091_b8) 2019; 91
Rathore (10.1016/j.eti.2020.101091_b29) 2018; 83
10.1016/j.eti.2020.101091_b1
Wang (10.1016/j.eti.2020.101091_b39) 2020
Zhou (10.1016/j.eti.2020.101091_b41) 2012; 25
Crussell (10.1016/j.eti.2020.101091_b7) 2013
Sodhro (10.1016/j.eti.2020.101091_b33) 2019; 220
Jiang (10.1016/j.eti.2020.101091_b12) 2007
Wahler (10.1016/j.eti.2020.101091_b37) 2004
Ullah (10.1016/j.eti.2020.101091_b36) 2019
References_xml – reference: Wang, H., Guo, Y., Ma, Z., Chen, X., 2015. Wukong: A scalable and accurate two-phase approach to android app clone detection. In: Proceedings of the 2015 International Symposium on Software Testing and Analysis, pp. 71–82.
– year: 2013
  ident: b7
  article-title: Scalable semantics-based detection of similar android applications
  publication-title: Proc. of ESORICS, vol. 13
– volume: 65
  start-page: 1339
  year: 2015
  end-page: 1350
  ident: b18
  article-title: Privacy protection for preventing data over-collection in smart city
  publication-title: IEEE Trans. Comput.
– volume: 10
  start-page: 1516
  year: 2014
  end-page: 1526
  ident: b14
  article-title: An interactive trust model for application market of the internet of things
  publication-title: IEEE Trans. Ind. Inf.
– volume: 13
  start-page: 28
  year: 2017
  end-page: 47
  ident: b30
  article-title: IoT-Based big data: from smart city towards next generation super city planning
  publication-title: Int. J. Semant. Web Inf. Syst. (IJSWIS)
– start-page: 163
  year: 2015
  end-page: 173
  ident: b34
  article-title: Detecting clones in android applications through analyzing user interfaces
  publication-title: Proceedings of the 2015 IEEE 23rd International Conference on Program Comprehension
– start-page: 699
  year: 2018
  end-page: 700
  ident: b40
  article-title: Investigating vector-based detection of code clones using bigclonebench
  publication-title: 2018 25th Asia-Pacific Software Engineering Conference (APSEC)
– start-page: 92
  year: 2019
  end-page: 102
  ident: b11
  article-title: The strengths and behavioral quirks of java bytecode decompilers
  publication-title: 2019 19th International Working Conference on Source Code Analysis and Manipulation (SCAM)
– year: 2013
  ident: b26
  article-title: The Definitive ANTLR 4 Reference
– start-page: 315
  year: 2018
  end-page: 333
  ident: b15
  article-title: Design of cloud-based green iot architecture for smart cities
  publication-title: Internet of Things and Big Data Analytics Toward Next-Generation Intelligence
– start-page: e379
  year: 2019
  ident: b36
  article-title: Detection of clone scammers in android markets using IoT-based edge computing
  publication-title: Trans. Emerg. Telecommun. Technol.
– start-page: 76
  year: 2003
  end-page: 85
  ident: b32
  article-title: Winnowing: local algorithms for document fingerprinting
  publication-title: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data
– start-page: 1
  year: 2018
  end-page: 17
  ident: b10
  article-title: Security threats to critical infrastructure: the human factor
  publication-title: J. Supercomput.
– volume: 83
  start-page: 638
  year: 2018
  end-page: 652
  ident: b29
  article-title: Real-time secure communication for smart city in high-speed big data environment
  publication-title: Future Gener. Comput. Syst.
– year: 2014
  ident: b3
  article-title: Learning activation functions to improve deep neural networks
– start-page: 153
  year: 2012
  end-page: 160
  ident: b35
  article-title: Smartphone dual defense protection framework: Detecting malicious applications in android markets
  publication-title: 2012 8th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN)
– volume: 68
  start-page: 17
  year: 2013
  end-page: 20
  ident: b13
  article-title: Plagiarism detection over the web
  publication-title: Int. J. Comput. Appl.
– volume: 23
  start-page: 68
  year: 2016
  end-page: 74
  ident: b27
  article-title: Smartbuddy: defining human behaviors using big data analytics in social internet of things
  publication-title: IEEE Wirel. Commun.
– volume: 38
  start-page: 286
  year: 2018
  end-page: 300
  ident: b17
  article-title: Customizing information delivery to project stakeholders in the smart city
  publication-title: Sustain. Cities Soc.
– volume: 101
  start-page: 63
  year: 2016
  end-page: 80
  ident: b28
  article-title: Urban planning and building smart cities based on the internet of things using big data analytics
  publication-title: Comput. Netw.
– start-page: 317
  year: 2012
  end-page: 326
  ident: b42
  article-title: Detecting repackaged smartphone applications in third-party android marketplaces
  publication-title: Proceedings of the Second ACM Conference on Data and Application Security and Privacy
– start-page: 872
  year: 2006
  end-page: 881
  ident: b20
  article-title: GPLAG: detection of software plagiarism by program dependence graph analysis
  publication-title: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
– start-page: 335
  year: 2017
  end-page: 346
  ident: b19
  article-title: LibD: scalable and precise third-party library detection in android markets
  publication-title: 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE)
– volume: 7
  year: 2011
  ident: b25
  article-title: Research on examination paper recognizing and importing system based on ANTLR
  publication-title: Electron. Des. Eng.
– start-page: 239
  year: 2011
  end-page: 252
  ident: b6
  article-title: Analyzing inter-application communication in android
  publication-title: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services
– start-page: 96
  year: 2007
  end-page: 105
  ident: b12
  article-title: Deckard: Scalable and accurate tree-based detection of code clones
  publication-title: Proceedings of the 29th International Conference on Software Engineering
– reference: Mbarek, B., Ge, M., Pitner, T., 2020. Enhanced network intrusion detection system protocol for internet of things. In: Proceedings of the 35th Annual ACM Symposium on Applied Computing, pp. 1156–1163.
– volume: 25
  start-page: 50
  year: 2012
  end-page: 52
  ident: b41
  article-title: Hey, you, get off of my market: detecting malicious apps in official and alternative android markets
  publication-title: NDSS
– volume: 39
  start-page: 499
  year: 2018
  end-page: 507
  ident: b4
  article-title: Security and privacy challenges in smart cities
  publication-title: Sustain. Cities Soc.
– volume: 91
  start-page: 611
  year: 2019
  end-page: 619
  ident: b8
  article-title: Smart health monitoring and management system: Toward autonomous wearable sensing for internet of things using big data analytics
  publication-title: Future Gener. Comput. Syst.
– volume: 44
  start-page: 144
  year: 2019
  end-page: 151
  ident: b9
  article-title: Constrained application for mobility management using embedded devices in the Internet of Things based urban planning in smart cities
  publication-title: Sustainable Cities Soc.
– volume: 220
  start-page: 1167
  year: 2019
  end-page: 1179
  ident: b33
  article-title: Towards an optimal resource management for IoT based green and sustainable smart cities
  publication-title: J. Cleaner Prod.
– start-page: 128
  year: 2004
  end-page: 135
  ident: b37
  article-title: Clone detection in source code by frequent itemset techniques
  publication-title: Source Code Analysis and Manipulation, Fourth IEEE International Workshop on
– year: 2019
  ident: b5
  article-title: Security of the internet of things: vulnerabilities, attacks and countermeasures
  publication-title: IEEE Commun. Surv. Tutor.
– year: 2018
  ident: b16
  article-title: A code classification method based on TF-IDF
  publication-title: DEStech Trans. Econ. Bus. Manag.
– start-page: 261
  year: 2020
  end-page: 271
  ident: b39
  article-title: Detecting code clones with graph neural network and flow-augmented abstract syntax tree
  publication-title: 2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)
– start-page: 555
  year: 2019
  end-page: 561
  ident: b23
  article-title: Syntax-based improvements to plagiarism detectors and their evaluations
  publication-title: Proceedings of the 2019 ACM Conference on Innovation and Technology in Computer Science Education
– volume: 40
  start-page: 600
  year: 2018
  end-page: 610
  ident: b31
  article-title: Exploiting iot and big data analytics: Defining smart digital city using real-time urban data
  publication-title: Sustain. Cities Soc.
– reference: Abadi, M., et al., 2016a. Tensorflow: A system for large-scale machine learning. In: 12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16), pp. 265–283.
– year: 2016
  ident: b2
  article-title: Tensorflow: Large-scale machine learning on heterogeneous distributed systems
– start-page: 1
  year: 2015
  end-page: 8
  ident: b24
  article-title: Building green city with green choices in traffic
  publication-title: EChallenges E-2015 Conference
– volume: 38
  start-page: 348
  year: 2018
  end-page: 358
  ident: b21
  article-title: COVERS-UP: Collaborative verification of smart user profiles for social sustainability of smart cities
  publication-title: Sustain. Cities Soc.
– volume: 220
  start-page: 1167
  year: 2019
  ident: 10.1016/j.eti.2020.101091_b33
  article-title: Towards an optimal resource management for IoT based green and sustainable smart cities
  publication-title: J. Cleaner Prod.
  doi: 10.1016/j.jclepro.2019.01.188
– volume: 25
  start-page: 50
  issue: 4
  year: 2012
  ident: 10.1016/j.eti.2020.101091_b41
  article-title: Hey, you, get off of my market: detecting malicious apps in official and alternative android markets
  publication-title: NDSS
– start-page: 872
  year: 2006
  ident: 10.1016/j.eti.2020.101091_b20
  article-title: GPLAG: detection of software plagiarism by program dependence graph analysis
– start-page: 76
  year: 2003
  ident: 10.1016/j.eti.2020.101091_b32
  article-title: Winnowing: local algorithms for document fingerprinting
– start-page: 555
  year: 2019
  ident: 10.1016/j.eti.2020.101091_b23
  article-title: Syntax-based improvements to plagiarism detectors and their evaluations
– start-page: e379
  year: 2019
  ident: 10.1016/j.eti.2020.101091_b36
  article-title: Detection of clone scammers in android markets using IoT-based edge computing
  publication-title: Trans. Emerg. Telecommun. Technol.
– volume: 91
  start-page: 611
  year: 2019
  ident: 10.1016/j.eti.2020.101091_b8
  article-title: Smart health monitoring and management system: Toward autonomous wearable sensing for internet of things using big data analytics
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2017.12.059
– ident: 10.1016/j.eti.2020.101091_b22
  doi: 10.1145/3341105.3373867
– volume: 65
  start-page: 1339
  issue: 5
  year: 2015
  ident: 10.1016/j.eti.2020.101091_b18
  article-title: Privacy protection for preventing data over-collection in smart city
  publication-title: IEEE Trans. Comput.
  doi: 10.1109/TC.2015.2470247
– start-page: 96
  year: 2007
  ident: 10.1016/j.eti.2020.101091_b12
  article-title: Deckard: Scalable and accurate tree-based detection of code clones
– start-page: 92
  year: 2019
  ident: 10.1016/j.eti.2020.101091_b11
  article-title: The strengths and behavioral quirks of java bytecode decompilers
– start-page: 315
  year: 2018
  ident: 10.1016/j.eti.2020.101091_b15
  article-title: Design of cloud-based green iot architecture for smart cities
– year: 2018
  ident: 10.1016/j.eti.2020.101091_b16
  article-title: A code classification method based on TF-IDF
  publication-title: DEStech Trans. Econ. Bus. Manag.
– year: 2013
  ident: 10.1016/j.eti.2020.101091_b7
  article-title: Scalable semantics-based detection of similar android applications
– volume: 101
  start-page: 63
  year: 2016
  ident: 10.1016/j.eti.2020.101091_b28
  article-title: Urban planning and building smart cities based on the internet of things using big data analytics
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2015.12.023
– start-page: 1
  year: 2018
  ident: 10.1016/j.eti.2020.101091_b10
  article-title: Security threats to critical infrastructure: the human factor
  publication-title: J. Supercomput.
– volume: 38
  start-page: 286
  year: 2018
  ident: 10.1016/j.eti.2020.101091_b17
  article-title: Customizing information delivery to project stakeholders in the smart city
  publication-title: Sustain. Cities Soc.
  doi: 10.1016/j.scs.2017.12.012
– start-page: 163
  year: 2015
  ident: 10.1016/j.eti.2020.101091_b34
  article-title: Detecting clones in android applications through analyzing user interfaces
– volume: 7
  year: 2011
  ident: 10.1016/j.eti.2020.101091_b25
  article-title: Research on examination paper recognizing and importing system based on ANTLR
  publication-title: Electron. Des. Eng.
– start-page: 317
  year: 2012
  ident: 10.1016/j.eti.2020.101091_b42
  article-title: Detecting repackaged smartphone applications in third-party android marketplaces
– year: 2014
  ident: 10.1016/j.eti.2020.101091_b3
– year: 2013
  ident: 10.1016/j.eti.2020.101091_b26
– start-page: 239
  year: 2011
  ident: 10.1016/j.eti.2020.101091_b6
  article-title: Analyzing inter-application communication in android
– start-page: 335
  year: 2017
  ident: 10.1016/j.eti.2020.101091_b19
  article-title: LibD: scalable and precise third-party library detection in android markets
– start-page: 1
  year: 2015
  ident: 10.1016/j.eti.2020.101091_b24
  article-title: Building green city with green choices in traffic
– volume: 39
  start-page: 499
  year: 2018
  ident: 10.1016/j.eti.2020.101091_b4
  article-title: Security and privacy challenges in smart cities
  publication-title: Sustain. Cities Soc.
  doi: 10.1016/j.scs.2018.02.039
– year: 2019
  ident: 10.1016/j.eti.2020.101091_b5
  article-title: Security of the internet of things: vulnerabilities, attacks and countermeasures
  publication-title: IEEE Commun. Surv. Tutor.
– volume: 40
  start-page: 600
  year: 2018
  ident: 10.1016/j.eti.2020.101091_b31
  article-title: Exploiting iot and big data analytics: Defining smart digital city using real-time urban data
  publication-title: Sustain. Cities Soc.
  doi: 10.1016/j.scs.2017.12.022
– volume: 68
  start-page: 17
  issue: 15
  year: 2013
  ident: 10.1016/j.eti.2020.101091_b13
  article-title: Plagiarism detection over the web
  publication-title: Int. J. Comput. Appl.
– volume: 38
  start-page: 348
  year: 2018
  ident: 10.1016/j.eti.2020.101091_b21
  article-title: COVERS-UP: Collaborative verification of smart user profiles for social sustainability of smart cities
  publication-title: Sustain. Cities Soc.
  doi: 10.1016/j.scs.2017.11.030
– start-page: 153
  year: 2012
  ident: 10.1016/j.eti.2020.101091_b35
  article-title: Smartphone dual defense protection framework: Detecting malicious applications in android markets
– volume: 10
  start-page: 1516
  issue: 2
  year: 2014
  ident: 10.1016/j.eti.2020.101091_b14
  article-title: An interactive trust model for application market of the internet of things
  publication-title: IEEE Trans. Ind. Inf.
  doi: 10.1109/TII.2014.2306799
– year: 2016
  ident: 10.1016/j.eti.2020.101091_b2
– volume: 44
  start-page: 144
  year: 2019
  ident: 10.1016/j.eti.2020.101091_b9
  article-title: Constrained application for mobility management using embedded devices in the Internet of Things based urban planning in smart cities
  publication-title: Sustainable Cities Soc.
  doi: 10.1016/j.scs.2018.07.017
– ident: 10.1016/j.eti.2020.101091_b38
  doi: 10.1145/2771783.2771795
– volume: 23
  start-page: 68
  issue: 5
  year: 2016
  ident: 10.1016/j.eti.2020.101091_b27
  article-title: Smartbuddy: defining human behaviors using big data analytics in social internet of things
  publication-title: IEEE Wirel. Commun.
  doi: 10.1109/MWC.2016.7721744
– start-page: 128
  year: 2004
  ident: 10.1016/j.eti.2020.101091_b37
  article-title: Clone detection in source code by frequent itemset techniques
– ident: 10.1016/j.eti.2020.101091_b1
– start-page: 699
  year: 2018
  ident: 10.1016/j.eti.2020.101091_b40
  article-title: Investigating vector-based detection of code clones using bigclonebench
– start-page: 261
  year: 2020
  ident: 10.1016/j.eti.2020.101091_b39
  article-title: Detecting code clones with graph neural network and flow-augmented abstract syntax tree
– volume: 83
  start-page: 638
  year: 2018
  ident: 10.1016/j.eti.2020.101091_b29
  article-title: Real-time secure communication for smart city in high-speed big data environment
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2017.08.006
– volume: 13
  start-page: 28
  issue: 1
  year: 2017
  ident: 10.1016/j.eti.2020.101091_b30
  article-title: IoT-Based big data: from smart city towards next generation super city planning
  publication-title: Int. J. Semant. Web Inf. Syst. (IJSWIS)
  doi: 10.4018/IJSWIS.2017010103
SSID ssj0002315656
Score 2.2912436
Snippet Green and smart cities deliver services to their residents using mobile applications that make daily life more convenient. The privacy and security of these...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 101091
SubjectTerms Abstract syntax tree
cities
clones
computer software
Deep learning
environmental technology
Green city
Internet of Things
Mobile applications
screening
Title IoT-based green city architecture using secured and sustainable android services
URI https://dx.doi.org/10.1016/j.eti.2020.101091
https://www.proquest.com/docview/2574368211
Volume 20
WOSCitedRecordID wos000597138700009&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 2352-1864
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002315656
  issn: 2352-1864
  databaseCode: AIEXJ
  dateStart: 20140601
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2352-1864
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002315656
  issn: 2352-1864
  databaseCode: M~E
  dateStart: 20140101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3Nb9MwFLfK4AAHxKfYBshInKhSxflonGOFqODAtEMn7WbZjgOpqnTqx9Rd-Nt5z3GctNomduASRVbiWnm_Pv_eh98j5LPmQOpjLDnLTBgkSsaBTFgRJHqsecGjuCgT22wiOzvjl5f5-WCwa8_CXC-yuua7XX71X0UNYyBsPDr7AHH7SWEA7kHocAWxw_WfBP9jOQtwbyqGvzCnZqiRZ-_FC7bWP7BGT7uxlVqH694xKoklDCoYc1pkz3ffHYvDJHXvlrcAqnyD1VaKF4Ax67aZytXvDoaTRTDbrubO9zqVReVd0vLmpsn4ntRNaxHvkgD7k3mXhNVcEbC6gPGmPPnI3DLmVG8U9nQnwygdu1WtNx6G-chsqhH-4Kh7dr-E9sHW5hMO21y2uYApBE4hmikekcdRluaoD3_-6bxzwHqR6drOhG7dbUjcJgceLOQuUnOwvVvOMntBnjtjg04akLwkA1O_Is96JShfk3MPF2rhQhEutA8XauFCHVwoiIX24EIdXGgLlzfkYvpt9vV74LpsBDqOww0m4zKeaaZzA7YA2AexkUyXCkznAoPKKlIZmAF5UqRjqUsOhLRMU55FSRGWURnHb8lRvazNO0JhP8gUUNhMjxXa7VyFypRpZmQqS5XoYxK2n0loV4IeO6EsxJ3yOSZf_CtXTf2V-x5O2m8vHIFsiKEAIN332qdWTgKUK0bMZG2W27WA_Qw7NESMnTxkHafkafe3eE-ONqut-UCe6OtNtV59tEj7C3egmqo
linkProvider ISSN International Centre
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=IoT-based+green+city+architecture+using+secured+and+sustainable+android+services&rft.jtitle=Environmental+technology+%26+innovation&rft.au=Ullah%2C+Farhan&rft.au=Al-Turjman%2C+Fadi&rft.au=Nayyar%2C+Anand&rft.date=2020-11-01&rft.issn=2352-1864&rft.eissn=2352-1864&rft.volume=20&rft.spage=101091&rft_id=info:doi/10.1016%2Fj.eti.2020.101091&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_eti_2020_101091
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2352-1864&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2352-1864&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2352-1864&client=summon