共 50 条
[41]
Making Runtime Data Useful for Incident Diagnosis: An Experience Report
[J].
PRODUCT-FOCUSED SOFTWARE PROCESS IMPROVEMENT, PROFES 2018,
2018, 11271
:422-430
[43]
Repackaging Android Applications for Auditing Access to Private Data
[J].
2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES),
2012,
:388-396
[45]
Stateful Data Usage Control for Android Mobile Devices
[J].
International Journal of Information Security,
2017, 16
:345-369
[46]
An Analysis on Sensitive Data Passive Leakage in Android Applications
[J].
2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT),
2015,
:125-131
[47]
Detection and Deterrence from Data Collecting Applications in Android
[J].
2016 FOURTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC),
2016,
:326-331
[48]
Identifying Organizations Receiving Personal Data in Android Apps
[J].
SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY,
2022,
:592-596
[49]
Assessment of Source Data Vulnerability to Reproduction in Android Applications
[J].
2017 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN),
2017,
:122-126