Cited By
View all- Sun XChen XLi LCai HGrundy JSamhi JBissyandé TKlein J(2023)Demystifying Hidden Sensitive Operations in Android AppsACM Transactions on Software Engineering and Methodology10.1145/357415832:2(1-30)Online publication date: 29-Mar-2023
- Alaeiyan MParsa SP. V(2023)SoberJournal of Information Security and Applications10.1016/j.jisa.2023.10345174:COnline publication date: 1-May-2023
- Asghar HZhao BIkram MNguyen GKaafar DLamont SCoscia D(2023)Use of cryptography in malware obfuscationJournal of Computer Virology and Hacking Techniques10.1007/s11416-023-00504-yOnline publication date: 25-Sep-2023
- Show More Cited By