has been cited by the following article(s):
[1]
|
A Risk Assessment Framework for Mobile Apps in Mobile Cloud Computing Environments
Future Internet,
2024
DOI:10.3390/fi16080271
|
|
|
[2]
|
Classification and security assessment of android apps
Discover Internet of Things,
2023
DOI:10.1007/s43926-023-00047-0
|
|
|
[3]
|
Android mobile malware detection using fuzzy AHP
Journal of Information Security and Applications,
2021
DOI:10.1016/j.jisa.2021.102929
|
|
|
[4]
|
Android mobile malware detection using fuzzy AHP
Journal of Information Security and Applications,
2021
DOI:10.1016/j.jisa.2021.102929
|
|
|
[5]
|
PUREDroid
Proceedings of the 2019 3rd International Conference on Information System and Data Mining,
2019
DOI:10.1145/3325917.3325941
|
|
|
[6]
|
Fine-grained access control method for private data in android system
International Journal of Distributed Sensor Networks,
2019
DOI:10.1177/1550147719840232
|
|
|
[7]
|
Cyberspace Safety and Security
Lecture Notes in Computer Science,
2019
DOI:10.1007/978-3-030-37352-8_10
|
|
|
[8]
|
PUREDroid
Proceedings of the 2019 3rd International Conference on Information System and Data Mining,
2019
DOI:10.1145/3325917.3325941
|
|
|