共 50 条
- [31] Taming Exceptions in Android Applications 2018 29TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW), 2018, : 174 - 177
- [32] On the Automatic Categorisation of Android Applications 2012 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2012, : 149 - 153
- [33] Android Applications and Security Breach 2016 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING, DATA MINING, AND WIRELESS COMMUNICATIONS (DIPDMWC), 2016, : 164 - 169
- [34] Real Time Android Ransomware Detection by Analyzed Android Applications 2019 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2019, : 375 - 379
- [36] Decomposable Trust for Android Applications 2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, 2015, : 343 - 354
- [37] SteaelErgon: A Framework for Injecting Colluding Malicious Payload in Android Applications ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
- [38] A SECURITY ASSESSMENT METHOD FOR ANDROID APPLICATIONS BASED ON PERMISSION MODEL 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 701 - 705
- [39] SEMEO: A Semantic Equivalence Analysis Framework for Obfuscated Android Applications MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES, 2022, 419 : 322 - 346
- [40] A Technique for Evaluation and Detection of Potentially Vulnerable Code in Android Applications 2017 12TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2017,