최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기International journal of computer science and network security : IJCSNS, v.22 no.11, 2022년, pp.367 - 372
AlJeraisy, Lulwa Abdulmajeed (Cybersecurity Department, College of Computer and Information Sciences, King Saud University) , Alsultan, Arwa (Cybersecurity Department, College of Computer and Information Sciences, King Saud University)
In the age of smartphones, users accomplish their daily tasks using their smartphones due to the significant growth in smartphone technology. Due to these tremendous expansions, attackers are highly motivated to penetrate numerous mobile marketplaces with their developed malicious apps. Android has ...
Alshehri, A., Hewins, A., McCulley, M., Alshahrani, H., Fu, H., & Zhu, Y. (2017). Risks behind Device Information Permissions in Android OS. Communications and Network, 09(04), 219-234. https://doi.org/10.4236/cn.2017.94016
Jung, J. H., Kim, J. Y., Lee, H. C., & Yi, J. H. (2013, June 14). Repackaging Attack on Android Banking Applications and Its Countermeasures. Wireless Personal Communications, 73(4), 1421-1437. https://doi.org/10.1007/s11277-013-1258-x
Li, J., Sun, L., Yan, Q., Li, Z., Srisa-an, W., & Ye, H. (2018, July). Significant Permission Identification for MachineLearning-Based Android Malware Detection. IEEE Transactions on Industrial Informatics, 14(7), 3216-3225. https://doi.org/10.1109/tii.2017.2789219
Building SELinux Policy |. (n.d.). Android Open Source Project. Retrieved October 22, 2022, from https://source.android.com/docs/security/features/selinux/build
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.