Author:
Banuri Hammad,Alam Masoom,Khan Shahryar,Manzoor Jawad,Ali Bahar,Khan Yasar,Yaseen Mohsin,Tahir Mir Nauman,Ali Tamleek,Alam Quratulain,Zhang Xinwen
Publisher
Springer Science and Business Media LLC
Subject
Management Science and Operations Research,Computer Science Applications,Hardware and Architecture
Reference16 articles.
1. Enck W, Ongtang M, McDaniel P (2009) On lightweight mobile phone application certification. In: Proceedings of the 16th acm conference on computer and communications security acm, pp 235–245
2. Jamaluddin J, Zotou N, Coulton P (2004) Mobile phone vulnerabilities: a new generation of malware. In: 2004, ieee international symposium on consumer electronics, 1–3 Sept, pp 199–202
3. Apple App Store Approval Process (2007) Available at: http://en.wikipedia.org/wiki/App . Store#Approval process, 5 March 2007
4. Khan S, Khan S, Banuri H (2009) Analysis of Dalvik virtual machine and class path library. Available at: http://imsciences.edu.pk/serg/wp-content/uploads/2009/07/Analysis-of-Dalvik-vm.pdf . Nov 2009
5. Android reference: security and permissions. Available at: http://developer.android.com/guide/topics/security/security.html
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献