共 18 条
[1]
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]
Abadi M., 2005, P 12 ACM C COMP COMM, P340, DOI 10.1145/1102120.1102165.2
[3]
Alazab M., 2011, AusDM, V11, P171, DOI DOI 10.5555/2483628.2483648
[4]
[Anonymous], 2005, MORGAN KAUFMANN SERI
[5]
[Anonymous], 2016, 2016 8 IFIP INT NEW
[6]
Evaluation of Android Malware Detection Based on System Calls
[J].
IWSPA'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS,
2016,
:1-8
[7]
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
2014, 32 (02)
[9]
MonkeyDroid: Detecting Unreasonable Privacy Leakages of Android Applications
[J].
NEURAL INFORMATION PROCESSING, PT III,
2015, 9491
:384-391
[10]
Madani Pooria, 2016, 2016 IEEE Conference on Communications and Network Security (CNS), P376, DOI 10.1109/CNS.2016.7860519