相似文献/References:
[1]崔伟勇 邬丽红 曹翀.一种基于关注点的用例模型的逆向恢复方法[J].计算机技术与发展,2008,(09):34.
CUI Wei-yong,WU Li-hong,CAO Chong.An Approach of Recovering Use Case Models Based on Concerns[J].,2008,(07):34.
[2]徐建. 移动僵尸网络检测方法研究[J].计算机技术与发展,2016,26(12):117.
XU Jian. Investigation on Mobile Botnets Detecting[J].,2016,26(07):117.
[3]李红灵[],詹翊[]. Android恶意程序常用权限分析及统计研究[J].计算机技术与发展,2017,27(11):132.
LI Hong-ling[],ZHAN Yi[]. Statistics Analysis and Research on Common Permissions of Android Malwares[J].,2017,27(07):132.