共 22 条
[1]
Alam S., 2014, ACM INT C P SER, V2014
[2]
Andrejkova G., 2013, APPROXIMATE PATTERN, V1003, P52
[3]
Malware analysis performance enhancement using cloud computing
[J].
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES,
2014, 10 (01)
:1-10
[4]
Brahler S., 2010, ANAL ANDROID ARCHITE, P52
[6]
Chalise B., 2015, ANDROID PERMISSION
[7]
Ericsson, 2016, MOB REP, P7
[8]
Mining Permission Request Patterns from Android and Facebook Applications
[J].
12TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM 2012),
2012,
:870-875
[9]
Gismalla MSM, 2017, INT J INTEGR ENG, V9, P118
[10]
Malwarebytes, 2017, STAT MALW REP, P11