相似文献/References:
[1]袁志坚,王春平陈融,陈萍.Android平台安全威胁及其应对策略[J].计算机技术与发展,2013,(09):110.
YUAN Zhi-jian[],WANG Chun-ping[],CHEN Rong[],et al.Security Threats on Android Platform and Their Coping Strategies[J].,2013,(02):110.
[2]钱正旸,施勇,薛质. Android系统点击劫持攻防技术研究[J].计算机技术与发展,2015,25(10):135.
QIAN Zheng-yang,SHI Yong,XUE Zhi. Study of Clickjacking Technology on Android[J].,2015,25(02):135.
[3]杨佳,张慧翔,罗怡,等. 基于自组织映射的安卓恶意软件分析研究[J].计算机技术与发展,2016,26(01):86.
YANG Jia,ZHANG Hui-xiang,LUO Yi,et al. Research on Empirical Analysis of Android Malware Based on SOM[J].,2016,26(02):86.
[4]王倩文,沈苏彬,吴振宇.基于安卓平台的恶意软件动态监测的研究[J].计算机技术与发展,2018,28(08):124.[doi:10.3969/ j. issn.1673-629X.2018.08.026]
WANG Qian-wen,SHEN Su-bin,WU Zhen-yu.Research on Malware Dynamic Monitoring Based on Android Platform[J].,2018,28(02):124.[doi:10.3969/ j. issn.1673-629X.2018.08.026]