共 13 条
[1]
[Anonymous], J INTELLIGENT INFORM
[2]
[Anonymous], 2011, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
[3]
Blasing Thomas, 2010, 2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), P55, DOI 10.1109/MALWARE.2010.5665792
[4]
Egele M., 2011, PIOS DETECTING PRIVA
[5]
Mylonas A., 2012, DELEGATE SMARTPHONE
[6]
Peng H., 2012, P 2012 ACM C COMPUTE, P241
[7]
Rastogi V., 2013, EVALUATING ANDROID A
[8]
Schmidt A.-D., 2010, P 5 SEC RES C FUT SE, P978
[9]
Shabtai A., 2010, Proceedings 2010 International Conference on Computational Intelligence and Security (CIS 2010), P329, DOI 10.1109/CIS.2010.77
[10]
Shabtai A., 2010, MOBILE WIRELESS MIDD, P235, DOI DOI 10.1007/978-3-642-17758-3_17