|
[1]
|
Trusted Computing Group. https://trustedcomputinggroup.org/
|
|
[2]
|
张焕国, 罗捷, 金刚, 等. 可信计算研究进展[J]. 武汉大学学报(理学版), 2006, 52(5): 513-518.
|
|
[3]
|
Google. Profile Your App Performance. https://developer.android.com/studio/profile?hl=zh-cn
|
|
[4]
|
Google (2021) Battery Historian Tool. https://github.com/google/battery-historian
|
|
[5]
|
Duvvur, V. (2023) Modernizing with Confidence: Strategies for Enhancing Cybersecurity and Compliance in Legacy System Upgrade. International Journal of Emerging Trends in Computer Science and Information Technology, 4, 41-48. [Google Scholar] [CrossRef]
|
|
[6]
|
Zhao, X., Huang, G., Jiang, J., Gao, L. and Li, M. (2021) Research on Lightweight Anomaly Detection of Multimedia Traffic in Edge Computing. Computers & Security, 111, Article 102463. [Google Scholar] [CrossRef]
|
|
[7]
|
Khalid, S. and Hussain, F.B. (2024) Volmemdroid—Investigating Android Malware Insights with Volatile Memory Artifacts. Expert Systems with Applications, 253, Article 124347. [Google Scholar] [CrossRef]
|
|
[8]
|
Bampatsikos, M., Politis, I., Bolgouras, V. and Xenakis, C. (2023) Multi-Attribute Decision Making-Based Trust Score Calculation in Trust Management in IoT. Proceedings of the 18th International Conference on Availability, Reliability and Security, Benevento, 29 August-1 September 2023, 1-8. [Google Scholar] [CrossRef]
|
|
[9]
|
Nazir, A., Iqbal, Z. and Muhammad, Z. (2025) ZTA: A Novel Zero Trust Framework for Detection and Prevention of Malicious Android Applications. Wireless Networks, 31, 3187-3203. [Google Scholar] [CrossRef]
|
|
[10]
|
苏敏. Android系统UI性能测试方法的研究[D]: [硕士学位论文]. 武汉: 武汉理工大学, 2018.
|
|
[11]
|
Testin: 2013年8月中国好应用质量排行[EB/OL]. https://www.docin.com/p-703974880.html, 2025-07-25.
|
|
[12]
|
文伟平, 梅瑞, 宁戈. Android恶意软件检测技术分析和应用研究[J]. 通信学报, 2014, 35(8): 78-85.
|
|
[13]
|
Votipka, D., Vidas, T. and Christin, N. (2013) Passe-Partout: A General Collection Methodology for Android Devices. IEEE Transactions on Information Forensics and Security, 8, 1937-1946. [Google Scholar] [CrossRef]
|