共 51 条
[1]
AAFER Y., 2013, 9 INT C SEC PRIV COM
[2]
ALLEN J. L., 2016, THESIS
[3]
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1145/2901739.2903508, 10.1109/MSR.2016.056]
[4]
[Anonymous], P 20 ACM SIGSOFT S F
[5]
[Anonymous], P 33 ANN COMP SEC AP
[6]
[Anonymous], 2017, MAMADROID OCT
[7]
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
[J].
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014),
2014,
[8]
Au K. W. Y., 2012, Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, ACM, New York, NY, USA, P217, DOI 10.1145/2382196.2382222
[9]
AVDIIENKO V., 2015, P 37 INT C SOFTW ENG
[10]
Baxevanis Andreas D., 2004, Bioinformatics: a practical guide to the analysis of genes and proteins, V43