共 10 条
- [1] Android Developers Documentation, 2017, PACK WEAR APPS
- [2] [Anonymous], 2016, WEAR SOFTW
- [3] Au K. W. Y., 2012, Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, ACM, New York, NY, USA, P217, DOI 10.1145/2382196.2382222
- [4] A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 73 - 84
- [5] Felt AP, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P627
- [6] Developer mistakes in writing Android manifests: An empirical study of configuration errors [J]. 2017 IEEE/ACM 14TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2017), 2017, : 25 - 36
- [7] Mining Android Apps to Recommend Permissions [J]. 2016 IEEE 23RD INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), VOL 1, 2016, : 427 - 437
- [8] Mujahid Suhaib, 2017, 2017 IEEE/ACM 4th International Conference on Mobile Software Engineering and Systems (MOBILESoft). Proceedings, P96, DOI 10.1109/MOBILESoft.2017.25
- [9] Stevens R, 2013, IEEE WORK CONF MIN S, P31, DOI 10.1109/MSR.2013.6624000
- [10] [No title captured]