共 171 条
[1]
Ablon Lillian, 2014, TECHNICAL REPORT, P1
[2]
SoK: Lessons Learned From Android Security Research For Appified Software Platforms
[J].
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2016,
:433-451
[3]
ALGARNI A.M., 2014, Int. J. Comput. Inf. Eng., V8, P480, DOI DOI 10.5281/ZENODO.1091516
[4]
Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:805-823
[5]
Alsabah Mashael, 2014, COMPUT SURV, V49, P1
[6]
Anderson R., 2013, The Economics of Information Security and Privacy, P265
[7]
[Anonymous], ANONYMOUS GROUP JUST
[8]
[Anonymous], 2015, OVERVIEW EXPLOIT PAC
[9]
[Anonymous], 2016, CISCO VISUAL NETWORK, P1
[10]
[Anonymous], 2016, ANONYMITY PRIVACY 1