共 24 条
[1]
Abubaker H., 2018, International Journal of Advances in Soft Computing Its Applications, V10, P106
[2]
Alenezi M, 2017, IEEE JORDAN CONF APP
[3]
Alenezi Mamdouh, 2018, 5 S DAT MIN APPL SDM
[4]
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
[5]
Andronio Nicolo, 2015, Research in Attacks, Intrusions and Defenses. 18th International Symposium, RAID 2015. Proceedings: LNCS 9404, P382, DOI 10.1007/978-3-319-26362-5_18
[6]
[Anonymous], 2017, Internet Security Threat Report, V22
[8]
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
[J].
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014),
2014,
[9]
Arshad S, 2016, INT J ADV COMPUT SC, V7, P463
[10]
Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2666356.2594299, 10.1145/2594291.2594299]