共 29 条
- [1] A Forensic Analysis of Android Malware How is Malware Written and How it Could be Detected? [J]. 2014 IEEE 38TH ANNUAL INTERNATIONAL COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2014, : 384 - 393
- [2] [Anonymous], 2014 NETW DISTR SYST
- [3] [Anonymous], P 22 ACM SIGSOFT INT
- [4] [Anonymous], 2012, ANDROID SECURITY
- [5] [Anonymous], 2012, TRUST TRUSTWORTHY CO
- [6] Arp D., 2014, 2014 NETW DISTR SYST
- [7] Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2666356.2594299, 10.1145/2594291.2594299]
- [8] Au K. W. Y., 2012, Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, ACM, New York, NY, USA, P217, DOI 10.1145/2382196.2382222
- [9] Bay S.D, 2003, KDD 03, P29, DOI [10.1145/956750.956758, DOI 10.1145/956750.956758]
- [10] Chakradeo S., 2013, P 6 ACM C SEC PRIV W, P13, DOI DOI 10.1145/2462096.2462100