共 34 条
[1]
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1145/2901739.2903508, 10.1109/MSR.2016.056]
[4]
[Anonymous], 2011, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
[5]
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
[J].
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014),
2014,
[6]
Chen L., 2017, SEMISUPERVISED CLASS
[7]
Evaluation of Android Malware Detection Based on System Calls
[J].
IWSPA'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS,
2016,
:1-8
[8]
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
2014, 32 (02)
[9]
Fengguo Wei, 2017, Detection of Intrusions and Malware, and Vulnerability Assessment. 14th International Conference, DIMVA 2017. Proceedings: LNCS 10327, P252, DOI 10.1007/978-3-319-60876-1_12