[1]
|
吴吉义, 李文娟, 黄剑平, 章剑林, 陈德人. 移动互联网研究综述[J]. 中国科学: 信息科学, 2015(1): 45-69.
|
[2]
|
Feng, Q.-C., Wen, Q.-Y. and Fan, Y.-J. (2011) State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876, China. A Systemic Code-Protecting Methodology for the Dex File on Android platform. IEEE Beijing Section, China, Guangdong University of Technology, China. Proceedings of 2011 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS 2011) Vol. 02.IEEE Beijing Section, China, Guangdong University of Technology, China, 4.
|
[3]
|
卿斯汉. Android安全研究进展[J]. 软件学报, 2016(1): 45-71.
|
[4]
|
陈璟, 陈平华, 李文亮. Android内核分析[J]. 现代计算机(专业版), 2009(11): 112-115.
|
[5]
|
Zhang, X.L., Breitinger, F. and Baggil, I. (2016) Rapid Android Parser for Investigating DEX Files (RAPID). Digital Investigation.
|
[6]
|
张峰, 李基亮. 校园私有云存储方案的探索[J]. 华东师范大学学报(自然科学版), 2015(S1): 139-145.
|
[7]
|
Phillips, B., Stewart, C., Hardy, B., et al. (2015) Android Programming: The Big Nerd Ranch Guide. Big Nerd Ranch.
|
[8]
|
曾健平, 邵艳洁. Android系统架构及应用程序开发研究[J]. 微计算机信息, 2011(9): 1-3.
|
[9]
|
王良, 王伟平, 孟丹. FVS k-匿名: 一种基于k-匿名的隐私保护方法[J]. 高技术通讯, 2015(3): 228-223.
|
[10]
|
Weiss, M.A. (2008) Data Structures and Algorithm Analysis in Java: International Edition, 3/E. Journal of the American Chemical Society, 130, 2156-2157.
|
[11]
|
Gvero, I. (2013) Core Java Volume I: Fundamentals, 9th Edition by Cay S. Horstmann and Gary Cornell. Acm Sigsoft Software Engineering Notes, 38, 33-33.
|
[12]
|
Peierls, T., Goetz, B., Bloch, J., et al. (2006) Java Concurrency in Practice. Java Concurrency in Practice. Addison-Wesley, 1171-1177(7).
|