共 18 条
[1]
CNCERT/CC.CNCERT/CC Annual Report, pp. 53-56, (2013)
[2]
Miettinen M., Halonen P., Host-based intrusion detection for advanced mobile devices, Information Networking and Applications, 20, 4, pp. 72-76, (2006)
[3]
Enck W., Gilbert P., Chun B., Et al., TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones, (2010)
[4]
Schmidt A.D., Smartphone malware evolution revisited: Android next target?, Proceedings of the 4th International Conference on Malicious and Unwanted Software (MALWARE), pp. 1-7, (2009)
[5]
Schmidt A.D., Detection of Smartphone Malware, (2011)
[6]
Bose A., Hu X., Shin K.G., Et al., Behavioral detection of malware on mobile handsets, Proceedings of the 6th international conference on Mobile systems, applications, and services, pp. 225-238, (2008)
[7]
Fei W.F., Study on detection and protection techniques of mobile phone malicious code under the Android platform, (2012)
[8]
Google Project Hosting, (2013)
[9]
Enck W., Ongtang M., McDaniel P., On lightweight mobile phone application certification, Proceedings of the 16th ACM conference on Computer and communications security, pp. 235-245, (2009)
[10]
Huan Y., Yuqing Z., Yupu H., Et al., Android malware detection method based on permission sequential pattern mining algorithm, Journal on Communications, 34, ZI, pp. 106-115, (2014)