共 45 条
[1]
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]
[Anonymous], 2014, Proceedings of ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)
[3]
[Anonymous], 2015, NDSS
[4]
[Anonymous], [No title captured]
[5]
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
[J].
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014),
2014,
[6]
Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2666356.2594299, 10.1145/2594291.2594299]
[7]
Au K. W. Y., 2012, P 2012 ACM C COMP CO, DOI [10.1145/2382196.2382222, DOI 10.1145/2382196.2382222]
[8]
Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications
[J].
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17),
2017,
:71-85
[9]
Burguera I., 2011, P 1 ACM WORKSH SEC P, P15, DOI DOI 10.1145/2046614.2046619
[10]
The comparative study between China and South Korea on online shopping
[J].
2014 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT (ICMECG),
2014,
:16-19