共 18 条
- [1] A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 73 - 84
- [2] Chin E, 2011, P 9 INT C MOBILE SYS, P239, DOI DOI 10.1145/1999995.2000018
- [3] Das S., 2001, P 18 INT C MACHINE L, P74, DOI DOI 10.5555/645530.658297
- [4] Enck W, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P235
- [6] Felt A.P., 2012, P 8 S US PRIV SEC WA, P1, DOI [10.1145/2335356.2335360, DOI 10.1145/2335356.2335360]
- [7] Felt Adrienne Porter, 2011, P 1 ACM WORKSH SEC P, P3, DOI DOI 10.1145/2046614.2046618
- [8] Research on collaborative negotiation for e-commerce. [J]. 2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 2085 - 2088
- [9] Frank E, 2010, DATA MINING AND KNOWLEDGE DISCOVERY HANDBOOK, SECOND EDITION, P1269, DOI 10.1007/978-0-387-09823-4_66
- [10] Hall M., 2009, SIGKDD EXPLORATIONS, V11, P10, DOI DOI 10.1145/1656274.1656278