[1] |
Gartner says worldwide sales of mobile phones declined 3 percent in third quarter of 2012; smartphone sales increased 47 percent[EB/OL]. , 2013.
|
[2] |
中国互联网络信息中心[EB/OL]. , 2013.China internet network information center[EB/OL]. , 2013.
|
[3] |
下载APP安装信息被盗主因:盲目授权致信息泄露[EB/OL]. , 2013.Information stolen during download and installation APP, main reason:information disclosure due to blind authorization[EB/OL]. , 2013.
|
[4] |
WITTEN I H . Data Mining: Practical Machine Learning Tools and Techniques[M]. Beijing: China Machine Press, 2012.
|
[5] |
李海峰, 章宁, 朱建明 等. 时间敏感数据流上的频繁项集挖掘算法[J]. 计算机学报, 2012,35(11):2283-2293. LI H F , ZHANG N , ZHU J M , et al. Frequent itemset mining over time-sensitive streams[J]. Chinese Journal of Computers, 2012,35(11):2283-2293.
|
[6] |
Androguard[EB/OL]. , 2013.
|
[7] |
JIANG X X . An evaluation of the application (″app″) verification service in Android 4.2[EB/OL]. , 2013.
|
[8] |
ZHOU Y J , WANG Z , ZHOU W , et al. 2012 Hey, you, get off of my market: detecting malicious apps in official and alternative Android markets[A]. Proceedings of the 19th Annual Network & Distributed System Security Symposium[C]. 2012.1-13.
|
[9] |
ENCK W , ONGTANG M , MCDANIEL P . On lightweight mobile phone application certification[A]. Proceedings of the 16th ACM Con-ference on Computer and Communications Security CCS '09[C]. Chi-cago, IL, USA, 2009.235-245.
|
[10] |
BARRER D , KAYACIK H G , VAN OORSCHOT P C , et al. A meth-odology for empirical analysis of permission-based security models and its application to Android[A]. Proceedings of the 17th ACM Con-ference on Computer and Communications Security CCS '10[C]. Chi-cago, IL, USA, 2010.73-84.
|
[11] |
FELT A P , CHIN E , HANNA S , et al. Android permissions demysti-fied[A]. Proceedings of the 18th ACM Conference on Computer and Communications Security CCS '11[C]. Chicago, IL, USA, 2011.627-638.
|
[12] |
WEI X T , GOMEZ L , NEAMTIU I , et al. Permission evolution in the Android ecosystem[A]. Proceedings of the 28th Annual Computer Se-curity Applications Conference ACSAC '12[C]. Orlando, Florida, USA, 2012.31-40.
|
[13] |
WU D J , MAO C H , WEI T E , et al. DroidMat: Android malware detection through manifest and API calls tracing[A]. Proceedings of the Seventh Asia Joint Conference on Information Security Asia JCIS 2012[C]. Tokyo, Japan, 2012.62-69.
|
[14] |
SHABTAI A , KANONOY U , ELOVICI Y , et al. Andromaly: a behav-ioral malware detection framework for Android devices[J]. Journal of Intelligent Information Systems, 2012,38 (1):161-190.
|
[15] |
IKER B , URKO Z , SIMIN N T . Crowdroid: behavior-based malware detection system for Android[A]. Proceedings of the ACM CCS workshop on Security and Privacy in Smartphones and Mobile De-vices SPSM'11[C]. Chicago, Illinois, USA, 2011.15-26.
|
[16] |
AGRAWAL R , IMIELINSKI T , SWAMI A N . Ming association rules between sets of items in large databases[A]. Proceedings of the 1993 ACM SIGMOD the International Conference on Management of Data[C]. Washington DC, USA, 1993.207-216.
|
[17] |
WANG L N , TAN X B , PAN J F , et al. Application of prefixspan*algorithm in malware detection expert system[A]. Proceedings of the First International Workshop on Education Technology and Computer Science[C]. 2009.448-452.
|
[18] |
HAN J W , KAMBER M . Data Mining Concepts and Techniques[M]. Elsevier Inc San Francisco, 2007.
|
[19] |
KANTARDZIC M . Data mining: concepts, models, methods, and algorithms[A]. IEEE Computer Society, A John Wiley & Sons[C]. Hoboken, NJ, 2003.143-151.
|
[20] |
ZHOU Y J , JIANG X X . Dissecting Android malware: characteriza-tion and evolution[A]. Proceedings of the 33rd IEEE Symposium on Security and Privacy[C]. Oakland, USA, 2012.95-109.
|
[21] |
Google-play-crawler[EB/OL]. , 2012.
|
[22] |
The Android manifest.xml file[EB/OL]. , 2013.
|