Detecting repackaged smartphone applications in third-party android marketplaces. Zhou, W., Zhou, Y., Jiang, X., & Ning, P. In Bertino, E. & Sandhu, R. S., editors, Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012, San Antonio, TX, USA, February 7-9, 2012, pages 317–326, 2012. ACM.
Paper doi bibtex @inproceedings{DBLP:conf/codaspy/ZhouZJN12,
author = {Wu Zhou and
Yajin Zhou and
Xuxian Jiang and
Peng Ning},
editor = {Elisa Bertino and
Ravi S. Sandhu},
title = {Detecting repackaged smartphone applications in third-party android
marketplaces},
booktitle = {Second {ACM} Conference on Data and Application Security and Privacy,
{CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
pages = {317--326},
publisher = {{ACM}},
year = {2012},
url = {https://doi.org/10.1145/2133601.2133640},
doi = {10.1145/2133601.2133640},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/codaspy/ZhouZJN12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"JzeCWocrtyoBWTMMb","bibbaseid":"zhou-zhou-jiang-ning-detectingrepackagedsmartphoneapplicationsinthirdpartyandroidmarketplaces-2012","authorIDs":[],"author_short":["Zhou, W.","Zhou, Y.","Jiang, X.","Ning, P."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Wu"],"propositions":[],"lastnames":["Zhou"],"suffixes":[]},{"firstnames":["Yajin"],"propositions":[],"lastnames":["Zhou"],"suffixes":[]},{"firstnames":["Xuxian"],"propositions":[],"lastnames":["Jiang"],"suffixes":[]},{"firstnames":["Peng"],"propositions":[],"lastnames":["Ning"],"suffixes":[]}],"editor":[{"firstnames":["Elisa"],"propositions":[],"lastnames":["Bertino"],"suffixes":[]},{"firstnames":["Ravi","S."],"propositions":[],"lastnames":["Sandhu"],"suffixes":[]}],"title":"Detecting repackaged smartphone applications in third-party android marketplaces","booktitle":"Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012, San Antonio, TX, USA, February 7-9, 2012","pages":"317–326","publisher":"ACM","year":"2012","url":"https://doi.org/10.1145/2133601.2133640","doi":"10.1145/2133601.2133640","timestamp":"Tue, 06 Nov 2018 00:00:00 +0100","biburl":"https://dblp.org/rec/conf/codaspy/ZhouZJN12.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/codaspy/ZhouZJN12,\n author = {Wu Zhou and\n Yajin Zhou and\n Xuxian Jiang and\n Peng Ning},\n editor = {Elisa Bertino and\n Ravi S. Sandhu},\n title = {Detecting repackaged smartphone applications in third-party android\n marketplaces},\n booktitle = {Second {ACM} Conference on Data and Application Security and Privacy,\n {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},\n pages = {317--326},\n publisher = {{ACM}},\n year = {2012},\n url = {https://doi.org/10.1145/2133601.2133640},\n doi = {10.1145/2133601.2133640},\n timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/codaspy/ZhouZJN12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Zhou, W.","Zhou, Y.","Jiang, X.","Ning, P."],"editor_short":["Bertino, E.","Sandhu, R. S."],"key":"DBLP:conf/codaspy/ZhouZJN12","id":"DBLP:conf/codaspy/ZhouZJN12","bibbaseid":"zhou-zhou-jiang-ning-detectingrepackagedsmartphoneapplicationsinthirdpartyandroidmarketplaces-2012","role":"author","urls":{"Paper":"https://doi.org/10.1145/2133601.2133640"},"downloads":0},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/15/7381.bib","creationDate":"2021-02-20T16:08:33.068Z","downloads":0,"keywords":[],"search_terms":["detecting","repackaged","smartphone","applications","third","party","android","marketplaces","zhou","zhou","jiang","ning"],"title":"Detecting repackaged smartphone applications in third-party android marketplaces","year":2012,"dataSources":["WYRfQiCuXBDXYTBZn"]}