http://www.appbrain.com/stats/number-of-android-apps, 2014. ,
PScout, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.217-228, 2012. ,
DOI : 10.1145/2382196.2382222
A methodology for empirical analysis of permission-based security models and its application to android, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.73-84, 2010. ,
DOI : 10.1145/1866307.1866317
Automatically securing permission-based software by reducing the attack surface: an application to Android, Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, ASE 2012, pp.274-277, 2012. ,
DOI : 10.1145/2351676.2351722
URL : https://hal.archives-ouvertes.fr/hal-00700074
Latent dirichlet allocation, J. Mach. Learn. Res, vol.3, pp.993-1022, 2003. ,
Is this app safe?, Proceedings of the 21st international conference on World Wide Web, WWW '12, pp.311-320, 2012. ,
DOI : 10.1145/2187836.2187879
Rule induction with CN2: Some recent improvements, Machine learningEWSL-91, pp.151-163, 1991. ,
DOI : 10.1007/BFb0017011
Mobile experience benchmark, 2014. ,
A technique for computer detection and correction of spelling errors, Communications of the ACM, vol.7, issue.3, pp.171-176, 1964. ,
DOI : 10.1145/363958.363994
Android permissions demystified, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.627-638, 2011. ,
DOI : 10.1145/2046707.2046779
Mining Permission Request Patterns from Android and Facebook Applications, 2012 IEEE 12th International Conference on Data Mining, pp.870-875, 2012. ,
DOI : 10.1109/ICDM.2012.86
Why people hate your app, Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '13, pp.1276-1284, 2013. ,
DOI : 10.1145/2487575.2488202
Checking app behavior against app descriptions, Proceedings of the 36th International Conference on Software Engineering, ICSE 2014, p.31, 2014. ,
DOI : 10.1145/2568225.2568276
Do Android users write about electric sheep? Examining consumer reviews in Google Play, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC), pp.149-157, 2013. ,
DOI : 10.1109/CCNC.2013.6488439
Dynamic Deployment of Sensing Experiments in the Wild Using Smartphones, Proceedings of the International Conference on Distributed Applications and Interoperable Systems, DAIS'13, pp.43-56, 2013. ,
DOI : 10.1007/978-3-642-38541-4_4
URL : https://hal.archives-ouvertes.fr/hal-00804114
Retrieving and analyzing mobile apps feature requests from online reviews, 2013 10th Working Conference on Mining Software Repositories (MSR), pp.41-44, 2013. ,
DOI : 10.1109/MSR.2013.6624001
Dr. Android and Mr. Hide, Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '12, pp.3-14, 2012. ,
DOI : 10.1145/2381934.2381938
API change and fault proneness: A threat to the success of android apps, Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2013, p.477487, 2013. ,
MALLET: a machine learning for language toolkit, 2002. ,
AR-miner: mining informative reviews for developers from mobile app marketplace, Proceedings of the 36th International Conference on Software Engineering, ICSE 2014 ,
DOI : 10.1145/2568225.2568263
WHYPER: Towards automating risk assessment of mobile applications, USENIX Security, 2013. ,
C4. 5: programs for machine learning, 1993. ,
Asking for (and about) permissions used by Android apps, 2013 10th Working Conference on Mining Software Repositories (MSR), pp.31-40, 2013. ,
DOI : 10.1109/MSR.2013.6624000
Grounded theory methodology: An overview, Handbook of Qualitative Research, pp.273-285, 1994. ,
Curbing android permission creep, Proceedings of the Web 2.0 Security and Privacy 2011 workshop, 2011. ,
Developer economics q3 2014: State of the developer nation, 2014. ,
Permission evolution in the Android ecosystem, Proceedings of the 28th Annual Computer Security Applications Conference on, ACSAC '12, pp.31-40 ,
DOI : 10.1145/2420950.2420956
Permlyzer: Analyzing permission usage in Android applications, 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE), pp.400-410, 2013. ,
DOI : 10.1109/ISSRE.2013.6698893