共 29 条
[1]
A Forensic Analysis of Android Malware How is Malware Written and How it Could be Detected?
[J].
2014 IEEE 38TH ANNUAL INTERNATIONAL COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC),
2014,
:384-393
[2]
[Anonymous], 2014 NETW DISTR SYST
[3]
[Anonymous], P 22 ACM SIGSOFT INT
[4]
[Anonymous], 2012, ANDROID SECURITY
[5]
[Anonymous], 2012, TRUST TRUSTWORTHY CO
[6]
Arp D., 2014, 2014 NETW DISTR SYST
[7]
Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2666356.2594299, 10.1145/2594291.2594299]
[8]
Au K. W. Y., 2012, Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, ACM, New York, NY, USA, P217, DOI 10.1145/2382196.2382222
[9]
Bay S.D, 2003, KDD 03, P29, DOI [10.1145/956750.956758, DOI 10.1145/956750.956758]
[10]
Chakradeo S., 2013, P 6 ACM C SEC PRIV W, P13, DOI DOI 10.1145/2462096.2462100