[1]NetQin Mobile Inc. The first half of 2013 NetQin global mobile phone safety report [R/OL]. [2013-07-23]. http://cn.nq.com/neirong/2013Q2.pdf. (网秦.2013年上半年网秦全球手机安全报告[R/OL].[2013-07-23].http://cn.nq.com/neirong/2013Q2.pdf.)
[2]YI L, ZHANG N, LIU D. Study on mobile malware situation and trends [J]. Information and Communications Technologies, 2013,7(2):75-79.(衣莉莉,张尼,刘镝.移动恶意软件现状及发展趋势[J].信息通信技术,2013,7(2):75-79.)
[3]JIANG X, ZHOU Y. A survey of Android malware [M]. New York: Springer, 2013:3-20.
[4]CHU J, ZHENG L. The security analysis of Android OS [J]. Microcomputer and Its Application,2013,20(7):1-3.(初建朝, 郑力明. Android安全性分析[J].微型机与应用,2013,20(7):1-3.)
[5]SCHMIDT A D, BYE R, SCHMIDT H G, et al. Static analysis of executables for collaborative malware detection on Android [C]// Proceedings of the 2009 IEEE International Conference on Communications. Piscataway: IEEE Press, 2009:631-635.
[6]BURGUERA I, ZURUTUZA U, NADJM-TEHRANI S. Crowdroid: behavior-based malware detection system for Android [C]// Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. New York: ACM, 2011:15-26.
[7]CHIANG H S, TSAUR W. Mobile malware behavioral analysis and preventive strategy using ontology [C]// Proceedings of the 2010 IEEE Second International Conference on Social Computing. Piscataway: IEEE Press, 2010:1080-1085.
[8]SHABTAI A, ELOVICI Y. Applying behavioral detection on Android-based devices [C]// Proceedings of the Mobile Wireless Middleware, Operating Systems, and Applications. Berlin: Springer, 2010,48:235-249.
[9]Google. Manifest.permission [EB/OL]. [2013-11-01]. http://developer.android.com/reference/android/Manifest.permission.html.
[10]BARRERA D, KAYACIK H G, van OORSCHOT P C, et al. A methodology for empirical analysis of permission-based security models and its application to Android [C]// CCS '10: Proceedings of the 17th ACM Conference on Computer and Communications Security. New York: ACM, 2010:73-84.
[11]ZHOU Y, JIANG X. Dissecting Android malware: characterization and evolution [C]// Proceedings of the 2012 IEEE Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 2012:95-109.
[12]KIRA K, RENDELL L A. The feature selection problem: traditional methods and a new algorithm [C]// AAAI '92: Proceedings of the 10th National Conference on Artificial Intelligence. Palo Alto: AAAI Press,1992:129-134.
[13]DASH M, LIU H. Consistency-based search in feature selection [J]. Artificial Intelligence, 2003,151(1/2):155-176.
[14]YU L,LIU H. Efficient feature selection via analysis of relevance and redundancy [J]. Journal of Machine Learning Research, 2004,5(10):1205-1224.
[15]PENG H. Discussion about the naive Bayesian classifier based on selected and weighted attributes [D]. Guangzhou: Zhongshan Univiserty, 2010.(彭浩威.选择性加权朴素贝叶斯分类方法的讨论[D].广州:中山大学,2010.)
[16]virusshare.com. Because sharing is caring [EB/OL].[2013-10-21]. http://virusshare.com/support.
[17]LI Z, CHENG S, JIANG F. Static detection method for malicious behavior in Android Apps [J]. Computer Systems and Applications, 2013,22(7):148-151.(李子锋,程绍银,蒋凡.一种Android应用程序恶意行为的静态检测方法[J].计算机系统应用,2013,22(7):148-151.) |