共 25 条
[1]
Abad-Aramburu C., 2015, APLICACION METODOLOG, P2
[2]
[Anonymous], 2018, 2018 SONICWALL CYBER
[3]
Aptoide S.A, APTOIDE DESCARGA ENC
[4]
Balzarotti D., 2012, RES ATTACKS INTRUSIO, V7462, P400, DOI [10.1007/978-3-642-33338-5, DOI 10.1007/978-3-642-33338-5]
[5]
Christodorescu M, 2007, ADV INFORM SECUR, P193
[6]
Drake J. J., 2014, ANDROID HACKERS HDB, P577
[7]
Dubkey A., 2016, ANDROID SECURITY ATT, P280
[8]
Dunham K., 2014, Android malware and analysis, DOI [10.1201/b17598, DOI 10.1201/B17598]
[9]
Dunham K., 2008, MOBILE MALWARE ATTAC, P440
[10]
Eagle Chris., 2011, The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler, P672