Publisher
Springer Nature Switzerland
Reference25 articles.
1. Ebad, S.A., Darem, A.A., Abawajy, J.H.: Measuring software obfuscation quality-a systematic literature review. IEEE Access 9, 99024–99038 (2021)
2. Zhang, X., Breitinger, F., Luechinger, E., O’Shaughnessy, S.: Android application forensics: a survey of obfuscation, obfuscation detection and deobfuscation techniques and their impact on investigations. Forensic Sci. Int. Digit. Investig. 39, 301285 (2021)
3. Malicious android apps capitalizing on covid-19 promon. https://promon.co/security-news/malicious-android-apps-are-capitalizing-on-covid-19/. Accessed 15 Dec 2020
4. Sawadogo, Z., Mendy, G., Dembelle, J.M., Ouya, S.: Android malware classification: updating features through incremental learning approach (UFILA). In: 2022 24th International Conference on Advanced Communication Technology (ICACT), pp. 544–550. IEEE (2022)
5. Hargreaves, C., Chivers, H.: Recovery of encryption keys from memory using a linear scan. In: 2008 Third International Conference on Availability, Reliability and Security, pp. 1369–1376. IEEE (2008)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献