共 17 条
[1]
[Anonymous], 2013, CNCERT CC CNCERT CC, P53
[2]
Bose A, 2008, MOBISYS'08: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, P225
[3]
Enck W., 2010, P OSDI 10 VANC CAN
[4]
Enck W, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P235
[5]
Fei W. F., 2012, STUDY DETECTION PROT
[6]
Android Mobile Application System Call Event Pattern Analysis for Determination of Malicious Attack
[J].
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS,
2014, 8 (01)
:231-246
[7]
[黄颖 Huang Ying], 2014, [中南林业科技大学学报, Journal of Central South University of Forestry & Technology], V34, P106
[8]
A Novel Method to Avoid Malicious Applications on Android
[J].
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS,
2013, 7 (05)
:121-130
[9]
Liu Chang-ping, 2010, Application Research of Computers, V27, P2611, DOI 10.3969/j.issn.1001-3695.2010.07.059
[10]
Miettinen M, 2006, 20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, P72