共 28 条
[21]
Enhancing User Privacy on Android Mobile Devices via Permissions Removal
[J].
2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS),
2014,
:5070-5079
[22]
Sahs J., 2012, 2012 European Intelligence and Security Informatics Conference (EISIC), P141, DOI 10.1109/EISIC.2012.34
[23]
Sarma B.P, 2012, P 17 ACM S ACC CONTR, P13, DOI 10.1145/2295136.2295141
[24]
Vidas T., 2014, P 4 ACM WORKSH SEC P, P39, DOI [10.1145/2666620.2666630, DOI 10.1145/2666620.2666630]
[25]
DroidMat: Android Malware Detection through Manifest and API Calls Tracing
[J].
PROCEEDINGS OF THE 2012 SEVENTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2012),
2012,
:62-69
[26]
Evaluation and Analysis of Spectrum-Based Fault Localization with Modified Similarity Coefficients for Software Debugging
[J].
2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC),
2013,
:180-189
[27]
Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:1105-1116
[28]
Zhu M, 2014, ASIA PAC CONF ANTEN, P951, DOI 10.1109/APCAP.2014.6992660