共 51 条
[12]
Cristianini N., 2010, An Introduction to Support Vector Machines and Other Kernel-Based Learning Methods
[13]
Desnos A., 2011, Black Hat, 2011, Abu Dhabi, BlackHat'11, P77
[14]
Enck W, 2011, P 20 USENIX C SEC SE, P2
[15]
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
2014, 32 (02)
[16]
Faruki Parvez, 2013, P 6 INT C SEC INF NE, P152, DOI [10.1145/2523514.2523539, DOI 10.1145/2523514.2523539]
[17]
Automated Synthesis of Semantic Malware Signatures using Maximum Satisfiability
[J].
24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017),
2017,
[18]
Apposcopy: Semantics-Based Detection of Android Malware through Static Analysis
[J].
22ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (FSE 2014),
2014,
:576-587
[19]
Gascon H., 2013, P ACM C COMP COMM SE, P45
[20]
Goodfellow I, 2016, ADAPT COMPUT MACH LE, P1