The impact of vendor customizations on android security.
Lei WuMichael C. GraceYajin ZhouChiachih WuXuxian JiangPublished in: CCS (2013)
Keyphrases
- malware detection
- security issues
- mobile devices
- access control
- information security
- intrusion detection
- security threats
- information assurance
- neural network
- security problems
- security mechanisms
- network security
- data integrity
- cyber security
- security level
- computer security
- security requirements
- security management
- security measures