Cited By
View all- Kywe SLi YHong JYao C(2016)Dissecting developer policy violating apps: characterization and detection2016 11th International Conference on Malicious and Unwanted Software (MALWARE)10.1109/MALWARE.2016.7888725(1-10)Online publication date: Oct-2016
- Kywe SLi YDeng RHong J(2015)Detecting Camouflaged Applications on Mobile Application MarketsInformation Security and Cryptology - ICISC 201410.1007/978-3-319-15943-0_15(241-254)Online publication date: 17-Mar-2015
- Lindorfer MVolanis SSisto ANeugschwandtner MAthanasopoulos EMaggi FPlatzer CZanero SIoannidis S(2014)AndRadar: Fast Discovery of Android Applications in Alternative MarketsDetection of Intrusions and Malware, and Vulnerability Assessment10.1007/978-3-319-08509-8_4(51-71)Online publication date: 2014