|
M. K. Alzaylaee,S. Y. Yerima,S. Sezer. “EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning”. ACM on International Workshop on Security and Privacy Analytics ACM, 2017:65-72.
|
|
I. Burguera,U. Zurutuza,S. Nadjm-Tehrani. “Crowdroid: Behavior-based Malware Detection System for Android”. ACM Workshop on Security and Privacy in Smartphones and Mobile Devices ACM, 2011:15-26.
|
|
D. Chen, H. M. Zhang, X. L. Zhang. “Detection of Android Malware Security on System Calls”. Advanced Information Management, Communicates, Electronic and Automation Control Conference IEEE, 2017:974-978.
|
|
P. Q. Chen. “Software Behavior Based Trustworthiness Attestation for Computing Platform”. Journal of Software 7.1(2012):55-60.
|
|
X. Q. Cheng, X. L. Jin, Y. Z. Wang. “Survey on Big Data System and Analytic Technology”. Journal of Software,2014,25(9):1889?1908.
|
|
M. Dhingra. “Legal Issues in Secure Implementation of Bring Your Own Device (BYOD)”. Procedia Computer Science, 2016, 78:179-184.
|
|
M. Donner. “Toward a Security Ontology”. IEEE Security & Privacy1.3(2003):6-7.
|
|
W. Dan. “Trusted Analysis Model for Interactive Behavior of a Software System Based on Slicing Technology”. Journal of Beijing University of Technology, 39.5(2013):713-721.
|
|
W. Enck,D. Octeau,P. Mcdaniel,S. Chaudhuri. “A Study of Android Application Security”. Usenix Conference on Security USENIX Association, 2011:21-21.
|
|
L. G. Lei, J. W. Jing, Y. W. Wang, Z. W. Zhang. “A Behavior-Based System Resources Access Control Scheme for Android”. Journal of Computer Research and Development, 2014,51(5):1028-1038.
|
|
Z. M. Lin. “Classifying Android Malware with Dynamic Behavior Dependency Graphs”. Trustcom/bigdatase/ispa IEEE, 2017:378-385.
|
|
J. Y. Liang, C. J. Feng, P. Song. “A Survey on Correlation Analysis of Big Data”. Chinese Journal of Computers, 2016(1):1-28.
|
|
M. Schur,A. Roth,A. Zeller. “Mining Behavior Models from Enterprise Web Applications”. Joint Meeting on Foundations of Software Engineering 2013:422-432.
|
|
Z. H. Tan. “A Novel Trust Model Based on SLA and Behavior Evaluation for Clouds”. Privacy, Security and Trust IEEE, 2017:581-587.
|
|
J. Tian,H. Jiao. “A Kind of Dynamic Software Behavior Trust Model Based on Improved Subjective Logic”. Intelligent Automation & Soft Computing (2016):1-9.
|
|
Q. Q. Ye. “Analyzing Security Property of Android Application Implementation Using Formal Method”. International Conference on Engineering of Complex Computer Systems IEEE, 2016:214-217.
|
|
L. Zhuang,M. Cai,L. Chen. “Software Behavior-Based Trusted Dynamic Measurement”. Journal of Wuhan University 56.2(2010):133-137.
|