共 36 条
[1]
Ammar Nariman Tm, 2016, THESIS
[2]
Detection and Identification of Android Malware Based on Information Flow Monitoring
[J].
2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD),
2015,
:200-203
[3]
[Anonymous], 2016, INT J HYBRID INF TEC
[4]
[Anonymous], 2011, USENIX SECURITY S
[5]
[Anonymous], P 2 ACM C DAT APPL S
[6]
[Anonymous], 2012, P 2012 ACM C COMP CO
[7]
[Anonymous], 2010, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, DOI [10.1145/1755688.1755732, DOI 10.1145/1755688.1755732]
[8]
[Anonymous], IEEE T DEPENDABLE SE
[9]
[Anonymous], 2013, Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS '13, ACM, New York, NY, USA, DOI DOI 10.1145/2508859.2516728
[10]
Armando A., 2012, Trustworthy Global Computing-7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers, volume 8191 of TGC'12, V8191, P64