共 104 条
- [1] Ali Mohamed, 2017, 2017 IEEE/ACM 4th International Conference on Mobile Software Engineering and Systems (MOBILESoft). Proceedings, P79, DOI 10.1109/MOBILESoft.2017.3
- [2] Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1145/2901739.2903508, 10.1109/MSR.2016.056]
- [3] On the Feasibility of Malware Authorship Attribution [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2016, 2017, 10128 : 256 - 272
- [4] Andow B, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P585
- [5] [Anonymous], 2022, REQ PACK
- [6] [Anonymous], PERM ANDR
- [7] [Anonymous], 2022, WHAT YOU CAN DO F DR
- [8] [Anonymous], 2021, APP SIGN CONS
- [9] [Anonymous], 2018, 2018 REF EU DAT PROT
- [10] [Anonymous], 2022, ANDR MARK CRAWL