文件名称:AndroidPapers
下载
别用迅雷、360浏览器下载。
如迅雷强制弹出,可右键点击选“另存为”。
失败请重下,重下不扣分。
如迅雷强制弹出,可右键点击选“另存为”。
失败请重下,重下不扣分。
介绍说明--下载内容均来自于网络,请自行研究使用
这是搜集到的一些关于android安全方面的一些论文,有一些很经典的想法,英文版的paper-This is to collect some information about android security number of papers, there are some very classic idea, the English version of paper
(系统自动生成,下载前可以参看下载内容)
下载文件列表
| 文件名 | 大小 | 更新时间 |
|---|---|---|
|
| ||
| In English | ||
| ..........\A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework.pdf | ||
| ..........\A methodology for empirical analysis of permission-based security models and its application to Android.pdf | ||
| ..........\A Methodology for Empirical Analysis of.pdf | ||
| ..........\A Study of Android Application Security.pdf | ||
| ..........\An Android runtime security policy enforcement framework.pdf | ||
| ..........\Analysis and research of system security based on android.pdf | ||
| ..........\Analysis of android applications' permissions.pdf | ||
| ..........\Android forensics -investigation | analysis and mobile security for Google Android.pdf | |
| ..........\Android permission re-delegation detection and test case generation.pdf | ||
| ..........\Android Permissions A Perspective Combining Risks and.pdf | ||
| ..........\Android Permissions User Attention | Comprehension | and Behavior.pdf |
| ..........\Android Security Architecture.pdf | ||
| ..........\Android Security Permissions –Can We Trust Them.pdf | ||
| ..........\AndroidLeaks Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale.pdf | ||
| ..........\Apex Extending Android Permission Model and Enforcement with User-defined Runtime Constraints.pdf | ||
| ..........\Apex-Extending Android Permission Model and.pdf | ||
| ..........\Extending Android Security Enforcement with a Security Distance Model.pdf | ||
| ..........\Flexible data-driven security for Android.pdf | ||
| ..........\Google Android-An Updated Security Review.pdf | ||
| ..........\Improving Android Security with Layered.pdf | ||
| ..........\Modeling and enhancing Android's permission system.pdf | ||
| ..........\Modeling and Enhancing Android’s Permission System (2).pdf | ||
| ..........\On Lightweight Mobile Phone Application Certification.pdf | ||
| ..........\Permission Evolution in the Android Ecosystem.pdf | ||
| ..........\Permission-Based Abnormal Application Detection for Android.pdf | ||
| ..........\Privacy policy modelling and analysis for android applications.pdf | ||
| ..........\PScout Analyzing the Android Permission Specification.pdf | ||
| ..........\PUPDroid - Personalized user privacy mechanism for android.pdf | ||
| ..........\Runtime Verification Meets Android Security.pdf | ||
| ..........\Security mechanism analysis of open-source....pdf | ||
| ..........\Short Paper Enhancing Users’ Comprehension of Android.pdf | ||
| ..........\Towards formal analysis of the permission-based security model for Android.pdf | ||
| ..........\Towards Permission-Based Attestation for the Android Platform.pdf | ||
| ..........\Various approaches in analyzing Android applications with its permission-based security models.pdf | ||
| ..........\YAASE Yet Another Android Security Extension.pdf | ||
| ..........\相关资料网址.txt |