共 18 条
[1]
[Anonymous], MOB THREAT REP Q1 20
[2]
[Anonymous], 2012, P 10 INT C MOB SYST
[3]
[Anonymous], 2013, Proceedings of ACM Conference on Data and Application Security and Privacy (CODASPY)
[4]
[Anonymous], MCAFEE LABS THREATS
[5]
[Anonymous], 2011, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
[6]
[Anonymous], 2012, Proceedings of ACM Symposium on Access Control Models and Technologies
[7]
Au K. W. Y., 2012, PROC ACM C COMPUT CO, P217, DOI 10.1145/2382196.2382222
[8]
Enck W, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P235
[9]
Felt A.P., 2011, P 1 ACM WORKSH SEC P, DOI DOI 10.1145/2046614.2046618
[10]
Andro-profiler: Anti-malware System Based on Behavior Profiling of Mobile Malware
[J].
WWW'14 COMPANION: PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON WORLD WIDE WEB,
2014,
:737-738