共 44 条
[21]
Kumar RekhilM., 2014, Int J Comput Sci Inf Technol, V5, P7668
[22]
Mining permission patterns for contrasting clean and malicious android applications
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2014, 36
:122-132
[24]
Peev DR, 2018, ACTA ZOOL BULGAR, P3
[25]
Machine learning for high-speed corner detection
[J].
COMPUTER VISION - ECCV 2006 , PT 1, PROCEEDINGS,
2006, 3951
:430-443
[26]
Salahat E, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), P1059, DOI 10.1109/ICIT.2017.7915508
[27]
SecureList, 2018, MOB MALW EV 2018
[28]
Somarriba O., 2017, 2017 IEEE 37 CENTR A, P1, DOI [10.1109/CONCAPAN.2017.8278529, DOI 10.1109/CONCAPAN.2017.8278529]
[29]
StatCounter, 2024, Mobile Operating System Market Share Mexico