[1] |
GARTNER . Mobile opplications & enterprise mobility manage-ment[EB/OL]. .
|
[2] |
张玉清, 王凯, 杨欢 , 等. Android 安全综述[J]. 计算机研究与发展, 2014,51(7):1385-1396. ZHANG Y Q , WANG K , YANG H , et al. Survey of Android OS security[J]. Journal of Computer Research and Development, 2014,51(7):1385-1396.
|
[3] |
PISTOIA M W , TRIPP O , CENTONZE P , et al. Labyrinth:visually configur-able data-leakage detection in mobile applications[C]//2015 16th IEEE In-ternational Conference on Mobile Data Management. 2015,1:279-286.
|
[4] |
CHOW R , JAKOBSSON M , MASUOKA R , et al. Authentication in the clouds:a framework and its application to mobile users[C]// Pro-ceedings of The 2010 ACM Workshop on Cloud Computing Security Workshop. 2010:1-6.
|
[5] |
XIE Y , DING W , WANG Y . A more extensible transparent encrypt file system based on filter driver[J]. Journal of Communications, 2016,11(4):383-387.
|
[6] |
韩心慧, 丁怡婧, 王东祺 , 等. Android恶意广告威胁分析与检测技术[J]. 清华大学学报(自然科学版), 2016,65(5):468-477. HAN X H , DING Y J , WANG D Q , et al. Android malicious AD threat analysis and detection techniques[J]. Journal of Tsinghua University (Science and Technology), 2016,65(5):468-477.
|
[7] |
LI Y , FANG J , LIU C , et al. Study on the application of Dalvik injec-tion technique for the detection of malicious programs in Android[C]//2015 5th International Conference on Electronics Information and Emergency Communication (ICEIEC). 2015:309-312.
|
[8] |
YANG T , CUI H , NIU S , et al. An analysis on sensitive data passive leakage in Android applications[C]//2015 IEEE 16th International Conference on Communication Technology (ICCT). 2015:125-131.
|
[9] |
MCDANIEL P , JAEGER T , LA PORTA T F , et al. Security and sci-ence of agility[C]//The First ACM Workshop on Moving Target De-fense. 2014:1-6.
|
[10] |
ASNAR Y , HENDRADJAYA B . Confidentiality and privacy informa-tion security risk assessment for Android-based mobile de-vices[C]//2015 International Conference on Data and Software Engi-neering (ICoDSE). 2015:1-6.
|
[11] |
SUJITHRA M , VAN HAU P , NGUYEN T . Android security analysis based on inter-application relationships[C]//Information Science and Appli-cations (ICISA) 2016. 2016:689-700.
|
[12] |
JIA P , HE X , LIU L , et al. A framework for privacy information pro-tection on Android[C]// 2015 International Conference on Computing,Networking and Communications (ICNC). 2015:1127-1131.
|
[13] |
KATZ G , ELOVICI Y , SHAPIRA B. . CoBAn:A context based model for data leakage prevention[J]. Information Sciences, 2014,262:137-158.
|
[14] |
GAJRANI J , SARSWAT J , TRIPATHI M , et al. A robust dynamic analysis system preventing SandBox detection by Android mal-ware[C]//8th International Conference on Security of Information and Networks. 2015:290-295.
|
[15] |
SALMAN A , ELHAJJ I H , CHEHAB A , et al. Mobile malware ex-posed[C]//2014 IEEE/ACS 11th International Conference on Com-puter Systems and Applications (AICCSA). 2014:253-258.
|
[16] |
HUANG Z , JIANG H , ZHOU K . An improved decoding algorithm for generalized RDP codes[J]. EEE Communications Letters, 2016,20(4):632-635.
|
[17] |
文伟平, 梅瑞, 宁戈 , 等. Android 恶意软件检测技术分析和应用研究[J]. 通信学报, 2014,35(8):78-85. WEN W P , MEI R , NING G , et al. Malware detection technology analysis and applied research of Android platform[J]. Journal on Communicationsh, 2014,35(8):78-85.
|
[18] |
MENG Y X , DONG J Y , YIN Y H , et al. Transparent encryption tech-nique for Word documents based on USB Key in manufacturing sys-tem[C]//Applied Mechanics and Materials. 2013:323-326.
|
[19] |
PARK J H , KIM D , PARK J S , et al. An enhanced security framework for reliable Android operating system[J]. Security and Communication Networks, 2013,9(6):528-534.
|
[20] |
JOVESKI B , MITREA M , GANJI R R . MPEG-4 solutions for virtual-izing RDP-based applications[C]//IS&T/SPIE Electronic Imaging,In-ternational Society for Optics and Photonics. Security and Communication Networks, 2014.
|
[21] |
刘洋, 邵旭东, 潘程达 , 等. 立体安全防御系统 TDSD—Droid 的实现[J]. 计算机科学, 2013,40(11A):228-234. LIU Y , SHAO X D , PAN C D , et al. Implementation of three-dimensional security defense system[J]. Computer Science, 2013,40(11A):228-234.
|
[22] |
XIAO H Y , YU B S , FEI C . Android's sensitive data leakage detection based on API monitoring[C]// International Conference on Cyberspace Technology (CCT 2014). 2014:1-4.
|