共 66 条
[14]
Canfora G, 2015, 2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, P27
[15]
Composition-malware: building Android malware at run time
[J].
PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015,
2015,
:318-326
[17]
Design of New OTP System using homomorphic graph by Changed Location and Angle of Fingerprint Features
[J].
INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS,
2008,
:63-+
[19]
Formal Methods Meet Mobile Code Obfuscation Identification of Code Reordering Technique
[J].
2017 IEEE 26TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES - INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE),
2017,
:263-268
[20]
Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment
[J].
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY,
2017,
:487-492