共 41 条
[1]
Amin M., 2016 IEEE INT C COMM, P1
[2]
[Anonymous], 2011, USENIX SECURITY S
[3]
[Anonymous], INFORM SCI
[4]
[Anonymous], 2012, Proceedings of the 19th ACM Conference on Computer and Communications Security, DOI DOI 10.1145/2382196.2382223
[5]
[Anonymous], Philosophical Transactions of the Royal Society of London for, DOI DOI 10.1098/RSTL.1763.0053
[6]
[Anonymous], 2006, PROC 10 IEEE SINGAP, DOI DOI 10.1109/ICCS.2006.301527
[7]
[Anonymous], 2013, Proceedings of ACM Conference on Data and Application Security and Privacy (CODASPY)
[8]
[Anonymous], 2012, Proceedings of ACM Symposium on Access Control Models and Technologies
[9]
Identifying Unknown Android Malware with Feature Extractions and Classification Techniques
[J].
2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1,
2015,
:182-189
[10]
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
[J].
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014),
2014,