共 10 条
[1]
Adida B., 2008, Proceedings of the 17th international conference on World Wide Web, P517, DOI DOI 10.1145/1367497.1367568
[2]
[Anonymous], 2012, P 10 INT C MOB SYST
[3]
[Anonymous], 2012, Internet Security Threat Report
[4]
[Anonymous], 2010, 9 USENIX S OPERATIN, DOI DOI 10.1145/2494522
[6]
Gibler C., 2012, Trust 2012, V7344, P291, DOI [10.1007/978- 3- 642-30921-2 _17, DOI 10.1007/978-3-642-30921-2_17]
[7]
Juniper, 2012, 2011 MOB THREATS REP
[8]
Miller C., 2012, IOS HACKERS HDB
[9]
Zhaohui Wang, 2012, Proceedings of the 2012 13th IEEE International Conference on Mobile Data Management (MDM), P52, DOI 10.1109/MDM.2012.31
[10]
Zhou YJ, 2011, LECT NOTES COMPUT SC, V6740, P93, DOI 10.1007/978-3-642-21599-5_7