Research on Clue Mining in Criminal Cases of Smart Phone Trojan Horse under the Background of Information Security
With the massive popularity and wide application of Android smartphones, there are more and more malware targeting Android smartphones. Research and analysis Android smart phone Trojan horses can provide corresponding technical support for malware detection on Android smart phones, which has good sc...
Saved in:
Main Authors: | Li Gang, Yong Wen |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2022-01-01
|
Series: | Journal of Robotics |
Online Access: | http://dx.doi.org/10.1155/2022/7568110 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A Trojan Horse in the Citadel of Stories?
by: Hartley John
Published: (2013-12-01) -
The “Trojan Horse” Approach to Tumor Immunotherapy: Targeting the Tumor Microenvironment
by: Delia Nelson, et al.
Published: (2014-01-01) -
Human parietal epithelial cells as Trojan horses in albumin overload
by: Giovanna Priante, et al.
Published: (2025-01-01) -
Secure and Privacy Enhanced Gait Authentication on Smart Phone
by: Thang Hoang, et al.
Published: (2014-01-01) -
Endoscopic Vein Harvesting for Coronary Bypass Grafting: A Blessing or a Trojan Horse?
by: Ryan Accord, et al.
Published: (2011-01-01)