共 32 条
[1]
[Anonymous], 2014, P 2014 6 INT C NEW T, DOI DOI 10.1109/NTMS.2014.6814026
[2]
[Anonymous], 2008, USENIX SEC S
[3]
Reducing the window of opportunity for Android malware Gotta catch 'em all
[J].
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES,
2012, 8 (1-2)
:61-71
[4]
Malware Detection Using Network Traffic Analysis in Android Based Mobile Devices
[J].
2014 EIGHTH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPS, SERVICES AND TECHNOLOGIES (NGMAST),
2014,
:66-71
[5]
Arp D., P 17 NETW DISTR SYST, V14
[6]
Blasing Thomas, 2010, 2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), P55, DOI 10.1109/MALWARE.2010.5665792
[8]
Canfora Gerardo, 2013, 2013 International Conference on Availability, Reliability and Security (ARES), P607, DOI 10.1109/ARES.2013.80
[9]
Canfora Gerardo, 2015, Detecting Android malware using sequences of system calls, P13, DOI [10.1145/2804345.2804349, DOI 10.1145/2804345.2804349]
[10]
Energy-Aware Performance Evaluation of Android Custom Kernels
[J].
2015 IEEE/ACM FOURTH INTERNATIONAL WORKSHOP ON GREEN AND SUSTAINABLE SOFTWARE (GREENS),
2015,
:1-7