共 50 条
- [21] On Purpose and by Necessity: Compliance Under the GDPR [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2018, 2018, 10957 : 20 - 37
- [22] Queryable Provenance Metadata For GDPR Compliance [J]. PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON SEMANTIC SYSTEMS, 2018, 137 : 262 - 268
- [23] Compliance with the GDPR Regulation for a CAD Organisation [J]. QUALITY-ACCESS TO SUCCESS, 2019, 20 (170): : 136 - 142
- [24] Static Analysis of Memory Leak in Android Applications [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 1023 - 1027
- [27] Static Analysis of Context Leaks in Android Applications [J]. 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING - SOFTWARE ENGINEERING IN PRACTICE TRACK (ICSE-SEIP 2018), 2018, : 215 - 224
- [28] AN APP BASED ON STATIC ANALYSIS FOR ANDROID RANSOMWARE [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 813 - 818
- [29] AN APP BASED ON STATIC ANALYSIS FOR ANDROID RANSOMWARE [J]. 2017 8TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2017,
- [30] Android Security via Static Program Analysis [J]. MOBISYS'17 PHD FORUM: PROCEEDINGS OF THE 2017 WORKSHOP ON MOBISYS 2017 PH.D. FORUM, 2017, : 19 - 20