Cited By
View all- Shahriar HIslam MClincy V(2017)Android malware detection using permission analysisSoutheastCon 201710.1109/SECON.2017.7925347(1-6)Online publication date: Mar-2017
- Jang JYun JMohaisen AWoo JKim H(2016)Detecting and classifying method based on similarity matching of Android malware behavior with profileSpringerPlus10.1186/s40064-016-1861-x5:1Online publication date: 3-Mar-2016
- Bacis EMutti SParaboschi SBao FMiller SZhou JAhn G(2015)AppPolicyModulesProceedings of the 10th ACM Symposium on Information, Computer and Communications Security10.1145/2714576.2714626(309-320)Online publication date: 14-Apr-2015
- Show More Cited By