共 63 条
[11]
Chen K., Liu P., Zhang Y., Achieving accuracy and scalability simultaneously in detecting application clones on Android markets, Proceedings of the 36th International Conference on Software Engineering, pp. 175-186, (2014)
[12]
Cimpanu C., Ghost Push Android Malware Infects 600,000 New Users Per Day, (2015)
[13]
contagiominidump, (2018)
[14]
Cordy J.R., Roy C.K., The nicad clone detector, IEEE 19th International Conference on Program Comprehension (ICPC), pp. 219-220, (2011)
[15]
Crussell J., Gibler C., Chen H., Andarwin: scalable detection of Android application clones based on semantics, IEEE Transactions on Mobile Computing, 14, 10, pp. 2007-2019, (2015)
[16]
Cutler S., Malshare Project, (2018)
[17]
Dang Y., Zhang D., Ge S., Huang R., Chu C., Xie T., Transferring code-clone detection and analysis to practice, IEEE/ACM 39th International Conference on Software Engineering: Software Engineering in Practice Track (ICSE-SEIP), pp. 53-62, (2017)
[18]
Demontis A., Melis M., Biggio B., Maiorca D., Arp D., Rieck K., Corona I., Giacinto G., Roli F., Yes, machine learning can be more secure! a case study on android malware detection, IEEE Transactions on Dependable and Secure Computing, (2017)
[19]
Dhaya R., Poongodi M., Detecting software vulnerabilities in Android using static analysis, International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), pp. 915-918, (2014)
[20]
Farhadi M.R., Fung B.C., Fung Y.B., Charland P., Preda S., Debbabi M., Scalable code clone search for malware analysis, Digital Investigation, 15, pp. 46-60, (2015)