|  | M. K. Alzaylaee,S. Y. Yerima,S. Sezer. “EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning”. ACM on International Workshop on Security and Privacy Analytics ACM, 2017:65-72. | 
																													
																							|  | I. Burguera,U. Zurutuza,S. Nadjm-Tehrani. “Crowdroid: Behavior-based Malware Detection System for Android”. ACM Workshop on Security and Privacy in Smartphones and Mobile Devices ACM, 2011:15-26. | 
																													
																							|  | D. Chen, H. M. Zhang, X. L. Zhang. “Detection of Android Malware Security on System Calls”. Advanced Information Management, Communicates, Electronic and Automation Control Conference IEEE, 2017:974-978. | 
																													
																							|  | P. Q. Chen. “Software Behavior Based Trustworthiness Attestation for Computing Platform”. Journal of Software 7.1(2012):55-60. | 
																													
																							|  | X. Q. Cheng, X. L. Jin, Y. Z. Wang. “Survey on Big Data System and Analytic Technology”. Journal of Software,2014,25(9):1889?1908. | 
																													
																							|  | M. Dhingra. “Legal Issues in Secure Implementation of Bring Your Own Device (BYOD)”.  Procedia Computer Science, 2016, 78:179-184. | 
																													
																							|  | M. Donner. “Toward a Security Ontology”. IEEE Security & Privacy1.3(2003):6-7. | 
																													
																							|  | W. Dan. “Trusted Analysis Model for Interactive Behavior of a Software System Based on Slicing Technology”. Journal of Beijing University of Technology, 39.5(2013):713-721. | 
																													
																							|  | W. Enck,D. Octeau,P. Mcdaniel,S. Chaudhuri. “A Study of Android Application Security”. Usenix Conference on Security USENIX Association, 2011:21-21. | 
																													
																							|  | L. G. Lei, J. W. Jing, Y. W. Wang, Z. W. Zhang. “A Behavior-Based System Resources Access Control Scheme for Android”. Journal of Computer Research and Development, 2014,51(5):1028-1038. | 
																													
																							|  | Z. M. Lin. “Classifying Android Malware with Dynamic Behavior Dependency Graphs”. Trustcom/bigdatase/ispa IEEE, 2017:378-385. | 
																													
																							|  | J. Y. Liang, C. J. Feng, P. Song. “A Survey on Correlation Analysis of Big Data”. Chinese Journal of Computers, 2016(1):1-28. | 
																													
																							|  | M. Schur,A. Roth,A. Zeller. “Mining Behavior Models from Enterprise Web Applications”. Joint Meeting on Foundations of Software Engineering 2013:422-432. | 
																													
																							|  | Z. H. Tan. “A Novel Trust Model Based on SLA and Behavior Evaluation for Clouds”. Privacy, Security and Trust IEEE, 2017:581-587. | 
																													
																							|  | J. Tian,H. Jiao. “A Kind of Dynamic Software Behavior Trust Model Based on Improved Subjective Logic”. Intelligent Automation & Soft Computing (2016):1-9. | 
																													
																							|  | Q. Q. Ye. “Analyzing Security Property of Android Application Implementation Using Formal Method”. International Conference on Engineering of Complex Computer Systems IEEE, 2016:214-217. | 
																													
																							|  | L. Zhuang,M. Cai,L. Chen. “Software Behavior-Based Trusted Dynamic Measurement”. Journal of Wuhan University 56.2(2010):133-137. |