共 16 条
- [3] Cai J., 2016, INT J NETWORK SECURI, V18, P182, DOI [10.6633/IJNS.201601.18(1).20, DOI 10.6633/IJNS.201601.18(1).20]
- [4] Cuimei Li, 2014, Applied Mechanics and Materials, V672-674, P1981, DOI 10.4028/www.scientific.net/AMM.672-674.1981
- [5] Android Security: A Survey of Issues, Malware Penetration, and Defenses [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (02): : 998 - 1022
- [6] Android Mobile Application System Call Event Pattern Analysis for Determination of Malicious Attack [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 231 - 246
- [8] Hu W., 2014, INT J HYBRID INFORM, V7, P393
- [9] Hu W., 2014, INT J MULTIMEDIA UBI, V9, P273
- [10] Kang H., 2015, INT J DISTRIBUTED SE, V2015