共 50 条
- [2] Detecting Android Malware Using Clone Detection [J]. Journal of Computer Science and Technology, 2015, 30 : 942 - 956
- [3] DroidCC: A Scalable Clone Detection Approach for Android Applications to Detect Similarity at Source Code Level [J]. 2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2018, : 100 - 105
- [4] Timing-Based Clone Detection on Android Markets [J]. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II, 2015, 153 : 375 - 381
- [5] Risk Analysis and Detection on Communication with Intents in Android Applications [J]. Niu, Shao-Zhang (szniu@bupt.edu.cn), 2017, Beijing Institute of Technology (37): : 625 - 630and636
- [8] Modelling Analysis and Auto Detection of Cryptographic Misuse in Android Applications [J]. 2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 75 - +
- [9] ANASTASIA: ANdroid mAlware detection using STAtic analySIs of Applications [J]. 2016 8TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2016,
- [10] APPraiser: A Large Scale Analysis of Android Clone Apps [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (08): : 1703 - 1713