Author:
Betarte Gustavo,Campo Juan,Gorostiaga Felipe,Luna Carlos
Publisher
Springer International Publishing
Reference26 articles.
1. Anderson, J.P.: Computer Security technology planning study. Technical report, Deputy for Command and Management System, USA (1972)
2. Android Developers: Application Fundamentals. http://developer.android.com/guide/components/fundamentals.html . Accessed Feb 2018
3. Android Developers: Requesting Permissions at Run Time. https://developer.android.com/intl/es/training/permissions/requesting.html . Accessed Feb 2018
4. Android Developers: R.styleable. http://developer.android.com/reference/android/R.styleable.html . Accessed Feb 2018
5. Armando, A., Carbone, R., Costa, G., Merlo, A.: Android permissions unleashed. In: Fournet, C., Hicks, M., Viganò, L. (eds.) IEEE 28th Computer Security Foundations Symposium, pp. 320–333. IEEE Computer Society (2015)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献