共 13 条
[1]
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]
[Anonymous], 2017, TENCENT NEWS GLOBAL
[3]
Chen Yanan, 2017, Computer Engineering and Applications, V53, P95, DOI 10.3778/j.issn.1002-8331.1607-0127
[4]
Li Jingping, 2017, J NW U NATL NATURAL, V38
[5]
Mining permission patterns for contrasting clean and malicious android applications
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2014, 36
:122-132
[6]
Shan Z, 2014, GROWING GRAPES YOUR
[7]
Shao Shudi, 2015, NAT C SOFTW APPL
[8]
University B Beijing, 2013, COMPUTER SCI
[9]
Wang Cong, 2017, J COMPUTER APPL SOFT, V34, P286
[10]
[魏松杰 Wei Songjie], 2015, [计算机科学, Computer Science], V42, P155