Changes
On December 2, 2024 at 6:12:00 PM UTC, admin:
-
Changed value of field
doi_status
toTrue
in Androzoo -
Changed value of field
doi_date_published
to2024-12-02
in Androzoo -
Added resource Original Metadata to Androzoo
f | 1 | { | f | 1 | { |
2 | "access_rights": "", | 2 | "access_rights": "", | ||
3 | "author": "Androzoo", | 3 | "author": "Androzoo", | ||
4 | "author_email": "", | 4 | "author_email": "", | ||
5 | "citation": [ | 5 | "citation": [ | ||
6 | "https://doi.org/10.48550/arXiv.2212.01274" | 6 | "https://doi.org/10.48550/arXiv.2212.01274" | ||
7 | ], | 7 | ], | ||
8 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | 8 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | ||
9 | "defined_in": "https://doi.org/10.48550/arXiv.2312.06423", | 9 | "defined_in": "https://doi.org/10.48550/arXiv.2312.06423", | ||
10 | "doi": "10.57702/8lhzdnyy", | 10 | "doi": "10.57702/8lhzdnyy", | ||
n | 11 | "doi_date_published": null, | n | 11 | "doi_date_published": "2024-12-02", |
12 | "doi_publisher": "TIB", | 12 | "doi_publisher": "TIB", | ||
n | 13 | "doi_status": false, | n | 13 | "doi_status": true, |
14 | "domain": "https://service.tib.eu/ldmservice", | 14 | "domain": "https://service.tib.eu/ldmservice", | ||
15 | "groups": [ | 15 | "groups": [ | ||
16 | { | 16 | { | ||
17 | "description": "", | 17 | "description": "", | ||
18 | "display_name": "Android Malware Detection", | 18 | "display_name": "Android Malware Detection", | ||
19 | "id": "0b481946-4322-4129-a007-4a6d4fd203e0", | 19 | "id": "0b481946-4322-4129-a007-4a6d4fd203e0", | ||
20 | "image_display_url": "", | 20 | "image_display_url": "", | ||
21 | "name": "android-malware-detection", | 21 | "name": "android-malware-detection", | ||
22 | "title": "Android Malware Detection" | 22 | "title": "Android Malware Detection" | ||
23 | }, | 23 | }, | ||
24 | { | 24 | { | ||
25 | "description": "", | 25 | "description": "", | ||
26 | "display_name": "Malware Detection", | 26 | "display_name": "Malware Detection", | ||
27 | "id": "ce625b3b-e2f0-4e71-aca5-464c2fe64967", | 27 | "id": "ce625b3b-e2f0-4e71-aca5-464c2fe64967", | ||
28 | "image_display_url": "", | 28 | "image_display_url": "", | ||
29 | "name": "malware-detection", | 29 | "name": "malware-detection", | ||
30 | "title": "Malware Detection" | 30 | "title": "Malware Detection" | ||
31 | } | 31 | } | ||
32 | ], | 32 | ], | ||
33 | "id": "06242acd-cac8-45c4-8e7b-49008cef76d4", | 33 | "id": "06242acd-cac8-45c4-8e7b-49008cef76d4", | ||
34 | "isopen": false, | 34 | "isopen": false, | ||
35 | "landing_page": "https://androzoo.uni.lu", | 35 | "landing_page": "https://androzoo.uni.lu", | ||
36 | "license_title": null, | 36 | "license_title": null, | ||
37 | "link_orkg": "", | 37 | "link_orkg": "", | ||
38 | "metadata_created": "2024-12-02T18:11:58.718385", | 38 | "metadata_created": "2024-12-02T18:11:58.718385", | ||
n | 39 | "metadata_modified": "2024-12-02T18:11:58.718391", | n | 39 | "metadata_modified": "2024-12-02T18:11:59.059888", |
40 | "name": "androzoo", | 40 | "name": "androzoo", | ||
41 | "notes": "The Androzoo database contains various | 41 | "notes": "The Androzoo database contains various | ||
42 | VirusTotal-validated malware as well as a number of safe applications | 42 | VirusTotal-validated malware as well as a number of safe applications | ||
43 | from trusted sources such as the Google Play Store and the | 43 | from trusted sources such as the Google Play Store and the | ||
44 | smartphone's operating system.", | 44 | smartphone's operating system.", | ||
n | 45 | "num_resources": 0, | n | 45 | "num_resources": 1, |
46 | "num_tags": 6, | 46 | "num_tags": 6, | ||
47 | "organization": { | 47 | "organization": { | ||
48 | "approval_status": "approved", | 48 | "approval_status": "approved", | ||
49 | "created": "2024-11-25T12:11:38.292601", | 49 | "created": "2024-11-25T12:11:38.292601", | ||
50 | "description": "", | 50 | "description": "", | ||
51 | "id": "079d46db-32df-4b48-91f3-0a8bc8f69559", | 51 | "id": "079d46db-32df-4b48-91f3-0a8bc8f69559", | ||
52 | "image_url": "", | 52 | "image_url": "", | ||
53 | "is_organization": true, | 53 | "is_organization": true, | ||
54 | "name": "no-organization", | 54 | "name": "no-organization", | ||
55 | "state": "active", | 55 | "state": "active", | ||
56 | "title": "No Organization", | 56 | "title": "No Organization", | ||
57 | "type": "organization" | 57 | "type": "organization" | ||
58 | }, | 58 | }, | ||
59 | "owner_org": "079d46db-32df-4b48-91f3-0a8bc8f69559", | 59 | "owner_org": "079d46db-32df-4b48-91f3-0a8bc8f69559", | ||
60 | "private": false, | 60 | "private": false, | ||
61 | "relationships_as_object": [], | 61 | "relationships_as_object": [], | ||
62 | "relationships_as_subject": [], | 62 | "relationships_as_subject": [], | ||
t | 63 | "resources": [], | t | 63 | "resources": [ |
64 | { | ||||
65 | "cache_last_updated": null, | ||||
66 | "cache_url": null, | ||||
67 | "created": "2024-12-02T18:38:42", | ||||
68 | "data": [ | ||||
69 | "dcterms:title", | ||||
70 | "dcterms:accessRights", | ||||
71 | "dcterms:creator", | ||||
72 | "dcterms:description", | ||||
73 | "dcterms:issued", | ||||
74 | "dcterms:language", | ||||
75 | "dcterms:identifier", | ||||
76 | "dcat:theme", | ||||
77 | "dcterms:type", | ||||
78 | "dcat:keyword", | ||||
79 | "dcat:landingPage", | ||||
80 | "dcterms:hasVersion", | ||||
81 | "dcterms:format", | ||||
82 | "mls:task", | ||||
83 | "datacite:isDescribedBy" | ||||
84 | ], | ||||
85 | "description": "The json representation of the dataset with its | ||||
86 | distributions based on DCAT.", | ||||
87 | "format": "JSON", | ||||
88 | "hash": "", | ||||
89 | "id": "dca6c2ee-a37a-4313-b606-e13a06d61aa9", | ||||
90 | "last_modified": "2024-12-02T18:11:59.052587", | ||||
91 | "metadata_modified": "2024-12-02T18:11:59.062638", | ||||
92 | "mimetype": "application/json", | ||||
93 | "mimetype_inner": null, | ||||
94 | "name": "Original Metadata", | ||||
95 | "package_id": "06242acd-cac8-45c4-8e7b-49008cef76d4", | ||||
96 | "position": 0, | ||||
97 | "resource_type": null, | ||||
98 | "size": 879, | ||||
99 | "state": "active", | ||||
100 | "url": | ||||
101 | resource/dca6c2ee-a37a-4313-b606-e13a06d61aa9/download/metadata.json", | ||||
102 | "url_type": "upload" | ||||
103 | } | ||||
104 | ], | ||||
64 | "services_used_list": "", | 105 | "services_used_list": "", | ||
65 | "state": "active", | 106 | "state": "active", | ||
66 | "tags": [ | 107 | "tags": [ | ||
67 | { | 108 | { | ||
68 | "display_name": "APKs", | 109 | "display_name": "APKs", | ||
69 | "id": "8ab5cc9b-fe65-49ee-9362-aae0a5085ca3", | 110 | "id": "8ab5cc9b-fe65-49ee-9362-aae0a5085ca3", | ||
70 | "name": "APKs", | 111 | "name": "APKs", | ||
71 | "state": "active", | 112 | "state": "active", | ||
72 | "vocabulary_id": null | 113 | "vocabulary_id": null | ||
73 | }, | 114 | }, | ||
74 | { | 115 | { | ||
75 | "display_name": "Android Malware", | 116 | "display_name": "Android Malware", | ||
76 | "id": "faef4f33-4ba4-4f0c-ad46-db39227cbb0f", | 117 | "id": "faef4f33-4ba4-4f0c-ad46-db39227cbb0f", | ||
77 | "name": "Android Malware", | 118 | "name": "Android Malware", | ||
78 | "state": "active", | 119 | "state": "active", | ||
79 | "vocabulary_id": null | 120 | "vocabulary_id": null | ||
80 | }, | 121 | }, | ||
81 | { | 122 | { | ||
82 | "display_name": "Androzoo", | 123 | "display_name": "Androzoo", | ||
83 | "id": "243af669-771b-44d4-983e-5594552702a0", | 124 | "id": "243af669-771b-44d4-983e-5594552702a0", | ||
84 | "name": "Androzoo", | 125 | "name": "Androzoo", | ||
85 | "state": "active", | 126 | "state": "active", | ||
86 | "vocabulary_id": null | 127 | "vocabulary_id": null | ||
87 | }, | 128 | }, | ||
88 | { | 129 | { | ||
89 | "display_name": "Malicious Software", | 130 | "display_name": "Malicious Software", | ||
90 | "id": "00862ed9-77cc-4d5f-8a33-5daa916cd513", | 131 | "id": "00862ed9-77cc-4d5f-8a33-5daa916cd513", | ||
91 | "name": "Malicious Software", | 132 | "name": "Malicious Software", | ||
92 | "state": "active", | 133 | "state": "active", | ||
93 | "vocabulary_id": null | 134 | "vocabulary_id": null | ||
94 | }, | 135 | }, | ||
95 | { | 136 | { | ||
96 | "display_name": "VirusTotal-validated", | 137 | "display_name": "VirusTotal-validated", | ||
97 | "id": "637adb9c-5876-4cb5-9bb1-268baa64d091", | 138 | "id": "637adb9c-5876-4cb5-9bb1-268baa64d091", | ||
98 | "name": "VirusTotal-validated", | 139 | "name": "VirusTotal-validated", | ||
99 | "state": "active", | 140 | "state": "active", | ||
100 | "vocabulary_id": null | 141 | "vocabulary_id": null | ||
101 | }, | 142 | }, | ||
102 | { | 143 | { | ||
103 | "display_name": "malware", | 144 | "display_name": "malware", | ||
104 | "id": "6c6d98d4-36ac-4499-880e-e9b6c5f6d50f", | 145 | "id": "6c6d98d4-36ac-4499-880e-e9b6c5f6d50f", | ||
105 | "name": "malware", | 146 | "name": "malware", | ||
106 | "state": "active", | 147 | "state": "active", | ||
107 | "vocabulary_id": null | 148 | "vocabulary_id": null | ||
108 | } | 149 | } | ||
109 | ], | 150 | ], | ||
110 | "title": "Androzoo", | 151 | "title": "Androzoo", | ||
111 | "type": "dataset", | 152 | "type": "dataset", | ||
112 | "version": "" | 153 | "version": "" | ||
113 | } | 154 | } |