共 43 条
- [1] Reduced models for efficient CCS verification [J]. FORMAL METHODS IN SYSTEM DESIGN, 2005, 26 (03) : 319 - 350
- [2] Brunese L, 2019, IEEE IJCNN
- [6] How I Met Your Mother? An Empirical Study about Android Malware Phylogenesis [J]. SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4, 2016, : 310 - 317
- [7] Composition-malware: building Android malware at run time [J]. PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 318 - 326
- [8] Carrera E., 2004, DIGITAL GENOME MAPPI
- [10] Ceron JM, 2016, 2016 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), P525, DOI 10.1109/ISCC.2016.7543792