Computer Science ›› 2016, Vol. 43 ›› Issue (3): 199-205.doi: 10.11896/j.issn.1002-137X.2016.03.037
Previous Articles Next Articles
ZHANG Xi-yuan, ZHANG Gang, SHEN Li-wei, PENG Xin and ZHAO Wen-yun
[1] Smartphone OS market share,Q3 2014.[2014-12-14].http://www.idc.com/prodserv/smartphone-os-market-share.jsp [2] Zhou W,Zhou Y,Jiang X,et al.Detecting repackaged smartphone applications in third-party android marketplaces[C]∥Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy,2012.ACM,2012:317-326 [3] Zhou Y,Jiang X.Dissecting android malware:Characterization and evolution[C]∥IEEE Symposium on Security and Privacy,2012.IEEE,2012:95-109 [4] Zhu Jiao,Li Hong-wei,Peng Xin,et al.On Relationship of Functions and Permissions in Android Applications[J].Computer Applications and Software,2014,1(10):27-33 [5] F-Droid | Free and Open Source Android App Repository.[2014-12-14] .https://f-droid.org/ [6] Manifest.permission.[2014-12-14].http://developer.an-droid.com/reference/android/Manifest.permission.html [7] Miller G A,Beckwith R,Fellbaum C,et al.Introduction to word-net:An on-line lexical database[J].International Journal of Lexicography,1990,3(4):235-244 [8] Wu Z,Palmer M.Verbs semantics and lexical selection[C]∥Proceedings of the 32nd Annual Meeting on Association for Computational Linguistics,1994.1994:133-138 [9] Jaccard_index.[2014-12-14].http://en.wikipedia.org/wiki/Jaccard_index [10] Kamiya T,Kusumoto S,Inoue K.CCFinder:a multilinguistic token-based code clone detection system for large scale source code[J].IEEE Transactions on Software Engineering,2002,28(7):654-670 [11] Google Play.[2014-12-14].https://play.google.com/store [12] Spectral Clusterer for WEKA.[2014-12-14].http://www.luigidragone.com/software/spectral-clusterer-for-weka/ [13] Spectral Clustering.[2014-12-14].http://en.wikipedia.org/wiki/Spectral_clustering [14] ActionBarSherlock.[2014-12-14].http://actionbarsher-lock.com [15] Jiang H,Ma H,Ren Z,et al.What makes a good app description?[C]∥Proceedings of the 6th Asia-Pacific Symposium on Internetware,2014.ACM,2014:45-53 [16] Pandita R,Xiao X,Yang W,et al.WHYPER:Towards Automating Risk Assessment of Mobile Applications[C]∥Proceedings of the 22nd Conference on USENIX Security Symposium,2013.2013:527-542 [17] Gorla A,Tavecchia I,Gross F,et al.Checking app behavioragainst app descriptions[C]∥ Proceedings of the 36th International Conference on Software Engineering,2014.ACM,2014:1025-1035 [18] Hanna S,Huang L,Wu E,et al.Juxtapp:A scalable system for detecting code reuse among android applications[M]∥Detection of Intrusions and Malware,and Vulnerability Assessment.Springer Berlin Heidelberg,2013:62-81 [19] Sun X,Zhongyang Y,Xin Z,et al.Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph[M]∥ICT Systems Security and Privacy Protection.Springer Berlin Heidelberg,2014:142-155 |
No related articles found! |
|