Open Access
Issue
JNWPU
Volume 38, Number 5, October 2020
Page(s) 965 - 970
DOI https://doi.org/10.1051/jnwpu/20203850965
Published online 08 December 2020
  1. IDC. Smartphone Market Share[EB/OL]. (2019-01-24)[2019-11-12]. https://www.idc.com/promo/smartphone-market-share/os [Google Scholar]
  2. 中国互联网协会. 2019年中国网民权益保护调查报告[EB/OL]. (2019-05-29)[2019-11-02]. https://max.book118.com/html/2019/0630/813513211700203-2.shtm [Google Scholar]
  3. Kabakus A T. What Static Analysis Can Utmost Offer for Android Malware Detection[J]. Information Technology and Control, 2019, 48(2): 235–249 [Article] (in Chinese) [CrossRef] [Google Scholar]
  4. He Y, Yang X, Hu B, et al. Dynamic Privacy Leakage Analysis of Android Third-Party Libraries[J]. Journal of Information Security and Applications, 2019, 46: 259–270 [Article] [CrossRef] [Google Scholar]
  5. Faruki P, Bharmal A, Laxmi V, et al. Android Security:A Survey of Issues, Malware Penetration, and Defenses[J]. IEEE Communications Surveys & Tutorials, 2017, 17(2): 998–1022 [Article] (in Chinese) [CrossRef] [Google Scholar]
  6. Arora A, Peddoju S K, Conti M. PermPair:Android Malware Detection using Permission Pairs[J]. IEEE Trans on Information Forensics and Security, 2020, 15: 1968–1982 [Article] [CrossRef] [Google Scholar]
  7. Liang S, Du X. Permission-Combination-Based Scheme for Android Mobile Malware Detection[C]//Proceedings of the 2014 International Conference on Communications, Sydney, 2014: 2301–2306 [Google Scholar]
  8. Mirzaei O, Suarez-Tangil G, De Fuentes J M, et al. Andrensemble: Leveraging Api Ensembles to Characterize Android Malware Families[C]//Proceedings of the 14th ACM Asia Conference on Computer and Communications Security, Aucland, 2019: 307–314 [Google Scholar]
  9. Zhou H, Zhang W, Wei F, et al. Analysis of Android Malware Family Characteristic Based on Isomorphism of Sensitive API Call Graph[C]//Proceedings of the 2nd International Conference on Data Science in Cyberspace(DSC), Shenzhen, 2017: 319–327 [Google Scholar]
  10. Tao G, Zheng Z, Guo Z, et al. MalPat:Mining Patterns of Malicious and Benign Android Apps via Permission-Related APIs[J]. IEEE Trans on Reliability, 2018, 67(99): 355–369 [Article] (in Chinese) [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.