共 13 条
[1]
[Anonymous], 2012, Proceedings of the 19th ACM Conference on Computer and Communications Security, DOI DOI 10.1145/2382196.2382223
[2]
[Anonymous], 2012, TRUST TRUSTWORTHY CO
[3]
[Anonymous], 2007, ESEC FSE 2007
[4]
[Anonymous], 2017, WIRED
[5]
AppBrain, 2016, NUMBER ANDROID APPL
[6]
A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:73-84
[7]
Cheng Lu, SCIENCEPAPER ONLINE
[8]
Jideng Han, 2014, J NETWORK NEW MEDIA, V3, P15
[9]
Kaspersky Labs, 2017, KASP SEC B STAT 2017
[10]
Lam Patrick, 2011, P CET US COMPL INFR