Filename | Size | Update |
---|
In English |
..........\A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework.pdf |
..........\A methodology for empirical analysis of permission-based security models and its application to Android.pdf |
..........\A Methodology for Empirical Analysis of.pdf |
..........\A Study of Android Application Security.pdf |
..........\An Android runtime security policy enforcement framework.pdf |
..........\Analysis and research of system security based on android.pdf |
..........\Analysis of android applications' permissions.pdf |
..........\Android forensics -investigation | analysis and mobile security for Google Android.pdf |
..........\Android permission re-delegation detection and test case generation.pdf |
..........\Android Permissions A Perspective Combining Risks and.pdf |
..........\Android Permissions User Attention | Comprehension | and Behavior.pdf |
..........\Android Security Architecture.pdf |
..........\Android Security Permissions –Can We Trust Them.pdf |
..........\AndroidLeaks Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale.pdf |
..........\Apex Extending Android Permission Model and Enforcement with User-defined Runtime Constraints.pdf |
..........\Apex-Extending Android Permission Model and.pdf |
..........\Extending Android Security Enforcement with a Security Distance Model.pdf |
..........\Flexible data-driven security for Android.pdf |
..........\Google Android-An Updated Security Review.pdf |
..........\Improving Android Security with Layered.pdf |
..........\Modeling and enhancing Android's permission system.pdf |
..........\Modeling and Enhancing Android’s Permission System (2).pdf |
..........\On Lightweight Mobile Phone Application Certification.pdf |
..........\Permission Evolution in the Android Ecosystem.pdf |
..........\Permission-Based Abnormal Application Detection for Android.pdf |
..........\Privacy policy modelling and analysis for android applications.pdf |
..........\PScout Analyzing the Android Permission Specification.pdf |
..........\PUPDroid - Personalized user privacy mechanism for android.pdf |
..........\Runtime Verification Meets Android Security.pdf |
..........\Security mechanism analysis of open-source....pdf |
..........\Short Paper Enhancing Users’ Comprehension of Android.pdf |
..........\Towards formal analysis of the permission-based security model for Android.pdf |
..........\Towards Permission-Based Attestation for the Android Platform.pdf |
..........\Various approaches in analyzing Android applications with its permission-based security models.pdf |
..........\YAASE Yet Another Android Security Extension.pdf |
..........\相关资料网址.txt |