共 37 条
[1]
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]
Alzaylaee MK, 2016, 2016 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY)
[3]
Alzaylaee MK, 2017, PROCEEDINGS OF THE 3RD ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, IWSPA 2017, P65, DOI 10.1145/3041008.3041010
[4]
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
[J].
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014),
2014,
[6]
AV-TEST, 2020, MALW STAT TRENDS REP
[8]
Chang WL, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC)
[10]
DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications
[J].
IEEE ACCESS,
2018, 6
:71229-71240