2C Gates,N Li,H Peng,et al.Generating Summary Risk Scores for Mobile Applications[J].IEEE Transactions on Dependable and Secure Computing,2014,11(3):238-251.
3Suarez Tangil,Tapiador Juan,Peris Lopez,et al.Evolution,Detection and Analysis of Malware for Smart Devices[J].IEEE Communications Surveys&Tutorials,2014,16(2):961-987.
4S Y Yerima,S Sezer,G Mc Williams.Analysis of Bayesian classification-based approaches for Android malware detection[J].IET Information Security,2014,8(12):25-36.
5V Rastogi,Chen Yan,Jiang Xuxian.Catch Me If You Can:Evaluating Android Anti-Malware Against Transformation Attacks[J].IEEE Transactions on Information Forensics and Security,2014,9(1):99-108.
6A Shabtai,Y Fledel,Y Elovici.Securing Android-Powered Mobile Devices Using SELinux[J].IEEE Security&Privacy,2010,8(3):36-44.