共 16 条
- [11] Mansfield-Devine Steve, 2012, Network Security, V2012, P5, DOI 10.1016/S1353-4858(12)70092-2
- [12] Mining permission patterns for contrasting clean and malicious android applications [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 36 : 122 - 132
- [15] Spreitzenbarth M., 2013, P 28 ANN ACM S APPL, P1808, DOI DOI 10.1145/2480362.2480701
- [16] Dissecting Android Malware: Characterization and Evolution [J]. 2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 95 - 109