Publication | Closed Access
Mining permission patterns for contrasting clean and malicious android applications
101
Citations
25
References
2013
Year
Mobile SecuritySoftware SecurityEngineeringProgram AnalysisInformation SecurityPermission PatternsMobile MalwareApplication AnalysisComputer ScienceSoftware AnalysisMalware Analysis
| Year | Citations | |
|---|---|---|
Page 1
Page 1