共 28 条
[1]
Appium, 2019, APKTOOL TOOL REVERSE
[2]
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
[J].
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014),
2014,
[3]
Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2666356.2594299, 10.1145/2594291.2594299]
[4]
Cheng ZY, 2017, 2017 INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE (NAS), P81
[5]
Automated Test Input Generation for Android: Are We There Yet?
[J].
2015 30TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE),
2015,
:429-440
[6]
The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2018, 20 (04)
:2658-2713
[7]
Continella A, 2017, P 2017 NETW DISTR SY
[8]
Gibler Clint, 2012, Lecture Notes in Computer Science, P291, DOI 10.1007/978-3-642-30921-2_17
[9]
Hegedus J, 2011, 2011 7 INT C COMP IN
[10]
Kuzuno H, 2013, I C DATA ENGIN WORKS, P112, DOI 10.1109/ICDEW.2013.6547438