[1]中国信通院. 移动互联网白皮书(2015版)[EBOL]. 2015 [20160128]. http:www.catr.cnkxyjqwfbbps201509t20150930_2129572.html[2]国家计算机网络应急技术处理协调中心. 2014年中国互联网网络安全报告[EBOL]. 2015 [20160128]. http:www.cert.org.cnpublishmainuploadFile2014%20Annual%20Report.pdf[3]看雪论坛Claud. 移动安全这五年[EBOL]. 2014 [20160128]. http:bbs.pediy.comshowthread.php?t=192872[4]潘宣辰. 移动恶意代码高级对抗技术解析和前瞻[EBOL]. 2014 [20160128]. http:www.doc88.comp9909424990747.html[5]Schmidt A D, Bye R, Schmidt H G, et al. Static analysis of executables for collaborative malware detection on android[C] Proc of 2009 IEEE Int Conf on Communications. Piscataway, NJ: IEEE, 2009: 15[6]Shabtai A, Kanonov U, Elovici Y, et al. “Andromaly”: A behavioral malware detection framework for android devices[J]. Journal of Intelligent Information Systems, 2012, 38(1): 161190[7]杨欢, 张玉清, 胡予濮, 等. 基于多类特征的Android应用恶意行为检测系统[J]. 计算机学报, 2014, 37(1): 1527[8]Dasgupta D, Yu S, Nino F. Recent advances in artificial immune systems: Models and applications[J]. Applied Soft Computing, 2011, 11(2): 15741587[9]Harmer P K, Williams P D. An artificial immune system architecture for computer security applications[J]. IEEE Trans on Evolutionary Computation, 2002, 6(3): 252280[10]Jerne N K. Towards a network theory of the immune system[J]. Annals of Immunology, 1974, 125C(12): 373389[11]Forrest S, Perelson A S, Allen L, et al. Selfnonself discrimination in a computer[C] Proc of IEEE Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1994: 202212[12]Castro L N D, Zuben F J V. The clonal selection algorithm with engineering applications[C] Proc of Genetic and Evolutionary Computation Conf. Las Vegas: Workshop on Artificial Immune Systems and Their Applications, 2000: 3642[13]Castro L N D, Zuben F J V. Learning and optimization using the clonal selection principle[J]. IEEE Trans on Evolutionary Computation, 2002, 6(3): 239251