Funder
National Key Foundational Research and Development on Network and Space Security, China
NSFC
Natural Science Basic Research Plan in Shaanxi Province of China
111 project
Chinese Educational Ministry
Aalto University
Subject
Artificial Intelligence,Computer Networks and Communications,Hardware and Architecture,Theoretical Computer Science,Software
Reference29 articles.
1. D. Barrera, H.G. Kayacik, P.C. Van Oorschot, A. Somayaji, A methodology for empirical analysis of permission-based security models and its application to Android, in: Proc. of 17th ACM Conf. Computer and Communications Security, CCS 10, 2010, pp. 73–84.
2. T. Blasing, L. Batyuk, A. Schmidt, S.A. Camtepe, S. Albayrak, An android application sandbox system for suspicious software detection, in: Malicious and Unwanted Software (MALWARE), 2010, pp. 55–62.
3. Semantics-based online malware detection: towards efficient real-time protection against malware;Das;IEEE Trans. Inf. Forensics Secur.,2016
4. B. Dixon, S. Mishra, Power based malicious code detection techniques for smartphone, in: 013 Twelfth IEEE International Conference on Trust, Security and Privacy in Conmputing and Communications, 2013,. pp. 142–149.
5. M. Egele, PiOS: Detecting privacy leaks in iOS applications. in: Network and Distributed System Security Symposium, 2011. www.iseclab.org/papers/egele-ndss11.pdf.
Cited by
102 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献