共 29 条
[1]
[Anonymous], 2011, W2SP 2011 CMU US
[2]
[Anonymous], 2014, P 36 INT C SOFTW ENG
[3]
[Anonymous], 2002, Mallet: a machine learning for languagetoolkit
[4]
[Anonymous], USENIX SECURITY
[5]
Au K. W. Y., 2012, ACM C COMP COMM SEC, P217, DOI [10.1145/2382196.2382222, DOI 10.1145/2382196.2382222]
[6]
A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:73-84
[7]
Bartel A, 2012, IEEE INT CONF AUTOM, P274, DOI 10.1145/2351676.2351722
[9]
Chia PernHui., 2012, WWW 12 P 21 INT C WO, P311, DOI DOI 10.1145/2187836.2187879
[10]
Clark P., 1991, MACHINE LEARNING EWS, P151, DOI 10.1007/bfb0017011