共 50 条
- [1] Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification [J]. FM 2015: FORMAL METHODS, 2015, 9109 : 73 - 89
- [2] Towards Formal Analysis of the Permission-based Security Model for Android [J]. ICWMC: 2009 FIFTH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMMUNICATIONS, 2009, : 87 - 92
- [4] Permission based detection system for android malware [J]. Utku, Anil (anilutku@gazi.edu.tr), 1600, Gazi Universitesi (32): : 1015 - 1024
- [5] Permission based detection system for android malware [J]. JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2017, 32 (04): : 1015 - 1024
- [6] Android Security: Permission Based Attacks [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2754 - 2759
- [8] RETRACTED ARTICLE: A novel permission ranking system for android malware detection—the permission grader [J]. Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 5071 - 5081
- [10] Permission based Android security: Issues and countermeasures [J]. COMPUTERS & SECURITY, 2014, 43 : 205 - 218