共 32 条
[2]
[Anonymous], 2016, IEEE T INF FORENSICS
[3]
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
[J].
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014),
2014,
[4]
Babic Domagoj, 2011, Computer Aided Verification. Proceedings 23rd International Conference, CAV 2011, P116, DOI 10.1007/978-3-642-22110-1_10
[5]
Bai C., 2019, IEEE T DEPEND SECURE
[6]
Battista Pasquale, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P542
[8]
Brierley GJ, 2016, SPRING GEOGR, P59, DOI 10.1007/978-3-319-30475-5_3
[9]
Canfora G., 2018, IEEE T SOFTWARE ENG
[10]
Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS
[J].
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2016,
:357-376