共 37 条
[3]
Al-Shehri H, 2018, PARASITOLOGY, V145, P1715, DOI [10.1017/S003118201800029X, 10.1017/s003118201800029x]
[4]
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
[5]
Anderson David P., 2019, J GRID COMPUT, P1
[6]
Bibi I., 2019, 2019 UKCHINA EMERGIN, P1
[7]
A Dynamic DL-Driven Architecture to Combat Sophisticated Android Malware
[J].
IEEE ACCESS,
2020, 8
:129600-129612
[8]
The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2018, 20 (04)
:2658-2713
[10]
Hamed Y.S.I., 2019, INT J COMPUT SCI INF, V17