共 218 条
- [1] Identifying Android malware using dynamically obtained features [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (01): : 9 - 17
- [2] Agarwal M, 2017, INT J MOD ED COMPUT, V9
- [4] AlNidawi HSA, 2017, J THEOR APPL INF TEC, V95
- [5] Alzaylaee M.K., 2016, communication presentee a 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), P1
- [6] Andronio Nicolo, 2015, Research in Attacks, Intrusions and Defenses. 18th International Symposium, RAID 2015. Proceedings: LNCS 9404, P382, DOI 10.1007/978-3-319-26362-5_18
- [7] [Anonymous], 2013, P 20 NETW DISTR SYST
- [8] [Anonymous], 2014, P 21 ANN NETW DISTR
- [9] [Anonymous], 2020, ANDROID TIMELINE VER
- [10] [Anonymous], 2020, EVOLUTION MOBILE PHO