共 43 条
[1]
Achara J.P., 2014, 7th ACM Conference on Security Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014, WISEC'14, P231
[2]
Ahmad Tohari, 2019, ICIC Express Letters, V13, P93, DOI 10.24507/icicel.13.02.93
[3]
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1145/2901739.2903508, 10.1109/MSR.2016.056]
[5]
Alshehri A, 2018, IEEE CONF COMM NETW
[6]
[Anonymous], 2012, P 2012 ACM C COMP CO, DOI DOI 10.1145/2382196.2382222
[8]
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
[J].
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014),
2014,
[9]
Asaithambi S., 2018, WHY APPLY FEATURE SE
[10]
Aurris A, 2020, G DATA MOBILE MALWAR