[1] |
周大铭 . 我国政府数据开放现状和保障机制[J]. 大数据, 2015,1(2): 19-30.
|
|
ZHOU D M . Status and safeguard mechanisms of Chinese government data opening[J]. Big Data Research, 2015,1(2): 19-30.
|
[2] |
CLAPP L , ANAND S , AIKEN A . Modelgen:mining explicit information flow specifications from concrete executions[C]// ISSTA,July 14-17,2015,Baltimore,USA. New York:ACM Press, 2015: 129-140.
|
[3] |
XU H , ZHOU Y F , GAO CY ,et al. SpyAware:investigating the privacy leakage signatures in app execution traces[C]// ISSRE,November 2-5,2015,Gaithersbury,USA. Piscataway:IEEE Press, 2015: 348-358.
|
[4] |
LI L , BARTEL A , BISSYANDE T F ,et al. IccTA:detecting inter-component privacy leaks in android Apps[C]// ICSE,May 16-24,2015,Florence,Italy. Piscataway:IEEE Press, 2015: 280-291.
|
[5] |
KLIEBER W , FLYNN L , BHOSALE A ,et al. Android taint flow analysis for app sets[C]// The 3rd ACM SIGPLAN International Workshop on the State of the Art in Java Program Analysis (SOAP’14),June 9-11,2014,Edinburgh,UK. New York:ACM Press, 2014: 1-6.
|
[6] |
FENG Y , ANAND S , DILLIG I ,et al. Apposcopy:semantics-based detection of android malware through static analysis[C]// The 22nd ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE 2014),November 16-22,2014,Hong Kong,China. New York:ACM Press, 2014.
|
[7] |
RASTHOFER S , ARZT S , BODDEN E . A machine-learning approach for classifying and categorizing Android sources and sinks[C]// Network and Distributed System Security Symposium,February 23-26,2014, San Diego,USA.[S.l:s.n], 2014.
|
[8] |
KRKA I , BRUN Y , POPESCU D ,et al. Using dynamic execution traces and program invariants to enhance behavioral model inference[C]// ICSE,May 2-8,2010,Cape Town,South Africa. New York:ACM Press, 2010: 179-182.
|
[9] |
GAFNY M , SHABTAI A , ROKACH L ,et al. Detecting data misuse by applying context-based data linkage[C]// The 2010 ACM Workshop on Insider Threats,October 8,2010,Hyatt Regency,USA. New York:ACM Press, 2010: 3-12.
|
[10] |
张兴科 . 数据挖掘在Web日志分析中的应用[J]. 微处理机, 2009,30(3): 80-83.
|
|
ZHANG X K . The study on data mining algorithm and application in Web log analysis[J]. Microprocessors, 2009,30(3): 80-83.
|
[11] |
赵龙, 江荣安 . 基于Hive的海量搜索日志分析系统研究[J]. 计算机应用研究, 2013,30(11): 3343-3345.
|
|
ZHAO L , JIANG R A . Research of massive searching logs analysis system based on Hive[J]. Application Research of Computers, 2013,30(11): 3343-3345.
|
[12] |
朱金清, 王建新, 陈志泊 . 基于APRIORI的层次化聚类算法及其在IDS日志分析中的应用[J]. 计算机研究与发展, 2007,44(s3): 326-330.
|
|
ZHU J Q , WANG J X , CHEN Z B . Aprioribased hiberarchical clustering algorithm and its application on IDS log analysis[J]. Journal of Computer Research and Development, 2007,44(s3): 326-330.
|
[13] |
ZAMORA J , MENDOZA M , ALLENDE E . Query intent detection based on query log mining[J]. Journal of Web Engineering, 2014,13(1-2): 24-52.
|
[14] |
YANG K , JIA X H , REN K . Secure and verifiable policy update outsourcing for big data access control in the cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2015,26(12): 3461-3470.
|
[15] |
YANG K , JIA X H , REN K ,et al. DACMACS:effective data access control for multi-authority cloud storage systems[J]. IEEE Transactions on Information Forensics and Security, 2013,8(11): 1790-1801.
|
[16] |
ROOS A , DRüSEDOW S , HOSSEINI M I ,et al. Trust level based data storage and data access control in a distributed storage environment[C]// The 8th IEEE International Conference on Mobile Cloud Computing (MobileCloud),June 27-July 2,2015,New York,USA. Piscataway:IEEE Press, 2015: 169-176.
|
[17] |
方滨兴, 贾焰, 李爱平 ,等. 大数据隐私保护技术综述[J]. 大数据, 2016,2(1): 1-18.
|
|
FANG B X , JIA Y , LI A P ,et al. Privacy preservation in big data:a survey[J]. Big Data Research, 2016,2(1): 1-18.
|
[18] |
高丰 . 开放数据:概念、现状与机遇[J]. 大数据, 2015,1(2): 9-18.
|
|
GAO F . Open data:concept,current situation and opportunity[J]. Big Data Research, 2015,1(2): 9-18.
|
[19] |
朱扬勇, 熊贇 . 大数据是数据、技术,还是应用[J]. 大数据, 2015,1(1): 71-81.
|
|
ZHU Y Y , XIONG Y . Defining big data[J]. Big Data Research, 2015,1(1): 71-81.
|