Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System
暂无分享,去创建一个
Gordon Russell | Junhua Chen | Shancang Li | Theodoros Spyridopoulos | Panagiotis Andriotis | Robert Ludwiniak | Panagiotis Andriotis | Theodoros Spyridopoulos | Shancang Li | Robert Ludwiniak | Gordon Russell | Junhua Chen
[1] Yajin Zhou,et al. Owner-Centric Protection of Unstructured Data on Smartphones , 2014, TRUST.
[2] Ninghui Li,et al. Effective Risk Communication for Android Apps , 2013, IEEE Transactions on Dependable and Secure Computing.
[3] Yajin Zhou,et al. DIVILAR: diversifying intermediate language for anti-repackaging on android platform , 2014, CODASPY '14.
[4] Yidong Cui,et al. A security assessment method for Android applications based on permission model , 2012, 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems.
[5] Albert B. Jeng,et al. Android privacy , 2012, 2012 International Conference on Machine Learning and Cybernetics.
[6] Jiaming He,et al. Extending Android Security Enforcement with a Security Distance Model , 2011, 2011 International Conference on Internet Technology and Applications.
[7] Hiroki Kuzuno,et al. Signature generation for sensitive information leakage in android applications , 2013, 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW).
[8] Xiaojiang Du,et al. Security threats to mobile multimedia applications: Camera-based attacks on mobile phones , 2014, IEEE Communications Magazine.