-
1
-
-
84865597964
-
-
May
-
Amazon appstore (May 2012), http://www.amazon.com/mobile-apps/
-
(2012)
-
-
-
2
-
-
84865583873
-
-
May
-
Android soft 4 u market (May 2012), http://www.androidsoft4u.com/
-
(2012)
-
-
-
3
-
-
84865583872
-
-
May
-
Androidonline market (May 2012), http://www.androidonline.net/
-
(2012)
-
-
-
4
-
-
84865597965
-
-
May
-
Apache hadoop (May 2012), http://hadoop.apache.org/
-
(2012)
-
-
-
5
-
-
84865611055
-
-
May
-
App china market (May 2012), http://www.appchina.com/
-
(2012)
-
-
-
6
-
-
84865606283
-
-
May
-
Brother soft market (May 2012), http://www.brothersoft.com/
-
(2012)
-
-
-
7
-
-
84865611057
-
-
May
-
Eoemarket (May 2012), http://www.eoemarket.com/
-
(2012)
-
-
-
8
-
-
84865592507
-
-
May
-
Freeware lovers market (May 2012), http://freewarelovers.com
-
(2012)
-
-
-
10
-
-
84865583871
-
-
May
-
Goapk market (May 2012), http://market.goapk.com
-
(2012)
-
-
-
11
-
-
84865611056
-
-
May
-
Handango market (May 2012), http://www.handango.com/
-
(2012)
-
-
-
12
-
-
84865583874
-
-
May
-
M360 market (May 2012), http://app.m.360.cn/
-
(2012)
-
-
-
13
-
-
84865592510
-
-
May
-
One mobile market (May 2012), http://www.1mobile.com/
-
(2012)
-
-
-
15
-
-
84865611054
-
-
May
-
Virustotal (May 2012), http://virustotal.com
-
(2012)
-
-
-
20
-
-
84865592511
-
-
May
-
Apache. Solr (May 2012), http://lucene.apache.org/solr/
-
(2012)
-
-
-
25
-
-
44949211954
-
-
IBM T. J. Watson Research Center May 2012
-
IBM T. J. Watson Research Center. Watson libraries for analysis (wala) (May 2012), http://wala.sourceforge.net/wiki/index.php/Main-Page
-
Watson Libraries for Analysis (Wala)
-
-
-
26
-
-
4644303571
-
A (sub) graph isomorphism algorithm for matching large graphs
-
Cordella, L.P., Foggia, P., Sansone, C., Vento, M.: A (sub) graph isomorphism algorithm for matching large graphs. IEEE Transactions on Pattern Analysis and Machine Intelligence 26(10), 1367-1372 (2004)
-
(2004)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.26
, Issue.10
, pp. 1367-1372
-
-
Cordella, L.P.1
Foggia, P.2
Sansone, C.3
Vento, M.4
-
27
-
-
84865597962
-
-
May
-
Davis, I.: Dexcd (May 2012), http://www.swag.uwaterloo.ca/dexcd/index. html
-
(2012)
Dexcd
-
-
Davis, I.1
-
28
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
USENIX Association
-
Enck, W., Gilbert, P., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, pp. 1-6. USENIX Association (2010)
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
29
-
-
80755187788
-
Android permissions demystified
-
ACM
-
Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 627-638. ACM (2011)
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
31
-
-
84865580700
-
-
Google May
-
Google. Android market (May 2012), http://market.android.com
-
(2012)
-
-
-
32
-
-
79959902968
-
Value-based program characterization and its application to software plagiarism detection
-
ACM
-
Jhi, Y.C., Wang, X., Jia, X., Zhu, S., Liu, P., Wu, D.: Value-based program characterization and its application to software plagiarism detection. In: Proceeding of the 33rd International Conference on Software Engineering, pp. 756-765. ACM (2011)
-
(2011)
Proceeding of the 33rd International Conference on Software Engineering
, pp. 756-765
-
-
Jhi, Y.C.1
Wang, X.2
Jia, X.3
Zhu, S.4
Liu, P.5
Wu, D.6
-
34
-
-
33749559863
-
Gplag: Detection of software plagiarism by program dependence graph analysis
-
ACM
-
Liu, C., Chen, C., Han, J., Yu, P.S.: Gplag: detection of software plagiarism by program dependence graph analysis. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 872-881. ACM (2006)
-
(2006)
Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 872-881
-
-
Liu, C.1
Chen, C.2
Han, J.3
Yu, P.S.4
-
35
-
-
84865574920
-
-
April
-
Lockheimer, H.: Android and security (April 2012), http://googlemobile. blogspot.com/2012/02/android-and-security.html
-
(2012)
Android and Security
-
-
Lockheimer, H.1
-
37
-
-
35048854764
-
Detecting software theft via whole program path birthmarks
-
Myles, G., Collberg, C.: Detecting software theft via whole program path birthmarks. In: Information Security, pp. 404-415 (2004)
-
(2004)
Information Security
, pp. 404-415
-
-
Myles, G.1
Collberg, C.2
-
38
-
-
1442310235
-
Finding plagiarisms among a set of programs with jplag
-
Prechelt, L., Malpohl, G., Philippsen, M.: Finding plagiarisms among a set of programs with jplag. J. UCS 8(11), 1016 (2002)
-
(2002)
J. UCS
, vol.8
, Issue.11
, pp. 1016
-
-
Prechelt, L.1
Malpohl, G.2
Philippsen, M.3
-
40
-
-
1142267351
-
Winnowing: Local algorithms for document fingerprinting
-
ACM
-
Schleimer, S., Wilkerson, D.S., Aiken, A.: Winnowing: local algorithms for document fingerprinting. In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, pp. 76-85. ACM (2003)
-
(2003)
Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data
, pp. 76-85
-
-
Schleimer, S.1
Wilkerson, D.S.2
Aiken, A.3
-
41
-
-
85137132511
-
Detecting repackaged smartphone applications in third-party android marketplaces
-
Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting repackaged smartphone applications in third-party android marketplaces. In: Proceedings of 2nd ACM Conference on Data and Application Security and Privacy, CODASPY 2012 (2012)
-
(2012)
Proceedings of 2nd ACM Conference on Data and Application Security and Privacy, CODASPY 2012
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
|