Author:
Ma Kai,Liu Mengyang,Guo Shanqing,Ban Tao
Publisher
Springer International Publishing
Reference10 articles.
1. https://www.strategyanalytics.com/access-services/devices/mobile-phones
2. Fuchs, A.P., Chaudhuri, A., Foster, J.S.: Scandroid: automated security certification of android applications. Manuscript, University of Maryland 2(3), (2009).
http://www.cs.umd.edu/avik/projects/scandroidascaa
3. Lecture Notes in Computer Science;C Gibler,2012
4. Lu, L., Li, Z., Wu, Z., et al.: Chex: statically vetting android apps for component hijacking vulnerabilities. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 229–240. ACM (2012)
5. Enck, W., Gilbert, P., Han, S., et al.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. (TOCS) 32(2), 5 (2014)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献