共 49 条
[2]
CAAL: Concurrency Workbench, Aalborg Edition
[J].
THEORETICAL ASPECTS OF COMPUTING - ICTAC 2015,
2015, 9399
:573-582
[3]
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
[J].
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014),
2014,
[4]
Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2594291.2594299, 10.1145/2666356.2594299]
[5]
Mining Apps for Abnormal Usage of Sensitive Data
[J].
2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1,
2015,
:426-436
[8]
Battista Pasquale, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P542
[9]
What the App is That? Deception and Countermeasures in the Android User Interface
[J].
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015,
2015,
:931-948