-
1
-
-
84865574920
-
-
Official Google Mobile Blog (February 2012)
-
Lockheimer, H.: Android and security. Official Google Mobile Blog (February 2012), http://googlemobile.blogspot.tw/2012/02/android-and-security.html
-
Android and Security
-
-
Lockheimer, H.1
-
3
-
-
80755187788
-
Android permissions demystified
-
Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 627-638 (2011)
-
(2011)
Proceedings of the 18th ACM Conference On Computer and Communications Security
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
4
-
-
84866899589
-
Analysis android applications' permissions
-
Johnson, R., Wang, Z., Gagnon, C., Stavrou, A.: Analysis android applications' permissions. In: Proceedings of the 6th International Conference on Software Security and Reliability (2012)
-
(2012)
Proceedings of the 6th International Conference On Software Security and Reliability
-
-
Johnson, R.1
Wang, Z.2
Gagnon, C.3
Stavrou, A.4
-
5
-
-
60049085302
-
Understanding android security
-
Enck, W., Ongtang, M., McDaniel, P.: Understanding android security. IEEE Security and Privacy 7(1), 50-57 (2009)
-
(2009)
IEEE Security and Privacy
, vol.7
, Issue.1
, pp. 50-57
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
6
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
Barrera, D., Kayacik, H.G., van Oorschot, P.C., Somayaji, A.: A methodology for empirical analysis of permission-based security models and its application to android. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 73-84 (2010)
-
(2010)
Proceedings of the 17th ACM Conference On Computer and Communications Security
, pp. 73-84
-
-
Barrera, D.1
Kayacik, H.G.2
van Oorschot, P.C.3
Somayaji, A.4
-
11
-
-
70449482715
-
Static analysis of executables for collaborative mal-ware detection on android
-
Schmidt, A.D., Bye, R., Schmidt, H.G., Clausen, J., Kiraz, O., Yuksel, K.A., Camtepe, S.A., Albayrak, S.: Static analysis of executables for collaborative mal-ware detection on android. In: Proceedings of IEEE International Conference on Communications (2009)
-
(2009)
Proceedings of IEEE International Conference On Communications
-
-
Schmidt, A.D.1
Bye, R.2
Schmidt, H.G.3
Clausen, J.4
Kiraz, O.5
Yuksel, K.A.6
Camtepe, S.A.7
Albayrak, S.8
-
14
-
-
76749092270
-
The WEKA data mining software: An update
-
Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. SIGKDD Explorations Newsletter 11(1), 10-18 (2009)
-
(2009)
SIGKDD Explorations Newsletter
, vol.11
, Issue.1
, pp. 10-18
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.H.6
-
15
-
-
4944228528
-
-
National Taiwan University
-
Hsu, C.W., Chang, C.C., Lin, C.J.: A practical guide to support vector classification. Technical report, Department of Computer Science and Information Engineering, National Taiwan University (2009), http://www.csie.ntu.edu.tw/%7ecjlin/libsvm/
-
(2009)
A Practical Guide to Support Vector Classification. Technical Report, Department of Computer Science and Information Engineering
-
-
Hsu, C.W.1
Chang, C.C.2
Lin, C.J.3
|