[1] Alibaba. 2016 Security Report [EB/OL]. (2017-03-09). https://jaq.alibaba.com.
[2] Concert/CC. China’s Internet network security report [R]. Beijiing: Post & Telecom Press,2016:130-150 .
[3] 朱佳伟,喻梁文,关志,等. Android 权限机制安全研究综述 [J]. 计算机应用研究,2015,32(10) : 2881-2885.
[4] Amos B, Turner H, White J. Applying machine learning classifiers to dynamic android malware detection at scale[C]//Wireless communications and mobile computing conference (iwcmc), 2013 9th international. Italy: IEEE, 2013: 1666-1671.
[5] Yang T, Qian K, Li L, et al. Static Mining and Dynamic Taint for Mobile Security Threats Analysis[C]//Smart Cloud (SmartCloud), IEEE International Conference on. New York: IEEE, 2016: 234-240.
[6] Zhang M, Duan Y, Yin H, et al. Semantics-aware android malware classification using weighted contextual api dependency graphs[C]//Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2014: 1105-1116.
[7] 王聪, 张仁斌, 李钢. 基于关联特征的贝叶斯 Android 恶意程序检测技术[J]. 计算机应用与软件,2017,34(1): 286-292.
[8] Saracino A, Sgandurra D, Dini G, et al. Madam: Effective and efficient behavior-based android malware detection and prevention[J]. IEEE Transactions on Dependable and Secure Computing, 2016,PP(99): 1-1.
[9] 孙伟, 孙雅杰, 夏孟友. 一种静态Android重打包恶意应用检测方法[J]. 信息安全研究,2017,3(8): 0-0.
[10] Yang T, Qian K, Li L, et al. Static Mining and Dynamic Taint for Mobile Security Threats Analysis[C]//Smart Cloud (SmartCloud), IEEE International Conference on. New York: IEEE, 2016: 234-240.
[11] 基于良性样本的 Android 系统恶意软件检测[J]. 计算机工程与设计, 2016,37(5): 1191-1195.
[12] Aafer Y, Du W, Yin H. Droidapiminer: Mining api-level features for robust malware detection in android[C]//International Conference on Security and Privacy in Communication Systems. Sydney: Springer, Cham, 2013: 86-103.
[13] Arp D, Spreitzenbarth M, Hubner M, et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket[C]//Chicago: NDSS. 2014.
[14] Yerima S Y, Sezer S, Muttik I. High accuracy android malware detection using ensemble learning[J]. IET Information Security, 2015, 9(6): 313-320.
[15] Martinelli F, Mori P, Saracino A. Enhancing android permission through usage control: a byod use-case[C]//Proceedings of the 31st Annual ACM Symposium on Applied Computing. New York: ACM, 2016: 2049-2056.
[16] Au K W Y, Zhou Y F, Huang Z, et al. Pscout: analyzing the android permission specification[C]//Proceedings of the 2012 ACM conference on Computer and communications security. New York: ACM, 2012: 217-228.
[17] 陈铁明, 杨益敏, 陈波. Maldetect: 基于 Dalvik 指令抽象的 Android 恶意代码检测系统[J]. 计算机研究与发展,2016,53(10): 2299-2306.
[18] Mithun N C, Rashid N U, Rahman S M M. Detection and classification of vehicles from video using multiple time-spatial images[J]. IEEE Transactions on Intelligent Transportation Systems,2012,13(3): 1215-1225.
[19] Jiawei Han,Micheline Kamber,Jian Pei.数据挖掘:概念与技术[M]..北京:机械工业出版社,2012: 181-185.
[20] Zhou Y, Jiang X. Dissecting android malware: Characterization and evolution[C]//Security and Privacy (SP), 2012 IEEE Symposium on. San Francisco: IEEE, 2012: 95-109.
|