Analysis and Research of System Security Based on Android
暂无分享,去创建一个
[1] Chan Yeob Yeun,et al. Practical Implementations for Securing VoIP Enabled Mobile Devices , 2009, 2009 Third International Conference on Network and System Security.
[2] Yuval Elovici,et al. Securing Android-Powered Mobile Devices Using SELinux , 2010, IEEE Security & Privacy.
[3] Zhou Cong. Development and Research of Mobile Termination Application Based on Android , 2008 .
[4] Patrick D. McDaniel,et al. Understanding Android Security , 2009, IEEE Security & Privacy Magazine.
[5] Toshiaki Tanaka,et al. A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework , 2010, 2010 IEEE Second International Conference on Social Computing.
[6] Samir Chatterjee,et al. Instant messaging and presence technologies for college campuses , 2005, IEEE Network.
[7] Toshiaki Tanaka,et al. A Small But Non-negligible Flaw in the Android Permission Scheme , 2010, 2010 IEEE International Symposium on Policies for Distributed Systems and Networks.
[8] Yuval Elovici,et al. Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method , 2010, J. Syst. Softw..