共 48 条
[1]
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1145/2901739.2903508, 10.1109/MSR.2016.056]
[2]
[Anonymous], 2011, USENIX SECURITY S
[3]
[Anonymous], INT SEC THREAT REP
[4]
[Anonymous], TECH REP
[5]
[Anonymous], 2015, SHARED DATA REPOSITO
[6]
[Anonymous], 2012, P 2 ACM C DATA APPL, DOI DOI 10.1145/2133601.2133640
[7]
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
[J].
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014),
2014,
[8]
Au K. W. Y., 2012, Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, ACM, New York, NY, USA, P217, DOI 10.1145/2382196.2382222
[9]
Mining Apps for Abnormal Usage of Sensitive Data
[J].
2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1,
2015,
:426-436