- DocumentoYet Another Android Security Extensioncargado porelvictorino
- Documentoxin_BehaviorDetectioncargado porelvictorino
- DocumentoUnderstanding Android Securitycargado porelvictorino
- DocumentoSmart Phone Malware Evolution Revisited- Android Next Targetcargado porelvictorino
- DocumentoSecuring Android-Powered Mobile Devices Using SELinuxcargado porelvictorino
- DocumentoOn Rootkit and Malware Detection in Smart Phonescargado porelvictorino
- DocumentoMeasuring Similarity of Malware Behaviorcargado porelvictorino
- DocumentoLIght Weigh Mobile Phone App Certificationcargado porelvictorino
- DocumentoKernel-Based Behavior Analysis for Android Malware Detectioncargado porelvictorino
- DocumentoFormal Analysis of the Permission Sec Model Androitcargado porelvictorino
- DocumentoFomal Model Enforcement in the Android Frameworkcargado porelvictorino
- DocumentoExtending Android Security Enforcement With a Security Distance Modelcargado porelvictorino
- DocumentoEnhancing Stealthiness & Efficiency of Android Trojanscargado porelvictorino
- DocumentoEnhancing Personal Information Security on Androidcargado porelvictorino
- DocumentoCcs10-Som-A Methodology for Empirical Analysis of Permission-based Security Models and Its Application to Androidcargado porelvictorino
- DocumentoAndroid Security Case Study With Bauhauscargado porelvictorino
- DocumentoAnalysis and Research of System Security Based on Androidcargado porelvictorino
- DocumentoAn Android Application Sandbox System for Suspicious Software Detectioncargado porelvictorino