Author:
Lee Chaeeun,Ko Eunnarae,Lee Kyungho
Publisher
Springer International Publishing
Reference21 articles.
1. Android Developers Homepage. https://developer.android.com/guide/topics/permissions/overview. Accessed 28 May 2020
2. Barrera, D., Kayacik, H.G., van Oorschot, P.C., Somayaji, A.: A methodology for empirical analysis of permission-based security models and its application to android. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, pp. 73–84 (2010)
3. Chin, E., Felt, A. P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in Android. In Proceedings of the 9th International Conference on Mobile systems, Applications, and Services, pp. 239–252 (2011)
4. DAS, Sanmay.: Filters, wrappers and a boosting-based hybrid for feature selection. In: ICML, pp. 74–81 (2001)
5. Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 235–245 (2009)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Probing AndroVul dataset for studies on Android malware classification;Journal of King Saud University - Computer and Information Sciences;2021-09