共 50 条
- [1] Discovering Persuaded Risk of Permission in Android Applications for Malicious Application Detection [J]. 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 922 - 926
- [2] Research on Data Mining of Permission-Induced Risk for Android IoT Devices [J]. APPLIED SCIENCES-BASEL, 2019, 9 (02):
- [5] Android Malicious Application Detection Using Permission Vector and Network Traffic Analysis [J]. 2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 1126 - 1132
- [6] Contrasting Permission Patterns between Clean and Malicious Android Applications [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 127 : 69 - 85
- [7] Mining permission patterns for contrasting clean and malicious android applications [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 36 : 122 - 132
- [8] Overprivileged Permission Detection for Android Applications [J]. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
- [9] Exploring the Malicious Android Applications and Reducing Risk using Static Analysis [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1316 - 1319