[1] |
EDDY N.Smartphone Sales Near Saturation Point in Mature Markets: IDC[J]. Eweek, 2013(9):13.
|
[2] |
SOUPPAYA M, SCARFONE K.Guidelines for Managing the Security of Mobile Devices in the Enterprise[S]. United States of America : National Institute of Standards and Technology,2013.
|
[3] |
ZAHADAT N, BLESSNER P, BLACKBURN T, et al.BYOD Security Engineering: A Framework and Its Analysis[J]. Computers & Security, 2015, 55:81-99.
|
[4] |
钱煜明, 董振江, 吕达,等. BYOD企业移动设备管理技术[J]. 中兴通讯技术, 2013, 19(6):33-38.
|
[5] |
STEPHENSON P.Mobile Device Management[J]. SC Magazine: For IT Security Professionals (UK Edition), 2016, 52(1):31-82.
|
[6] |
FARUKI P, BHARMAL A, LAXMI V, et al.Android Security: A Survey of Issues, Malware Penetration, and Defenses[J]. IEEE Communications Surveys & Tutorials, 2015, 17(2):998-1022.
|
[7] |
Google. The Android Source Code[EB/OL]. , 2017-4-10.
|
[8] |
YAGHMOURY K.Embedded Android: Porting, Extending, and Customizing[M]. United States of America: O'Reilly Media Inc, 2013.
|
[9] |
MCCARTY B.SELinux: NSA's Open Source Security Enhanced Linux[M]. United States of America: O'Reilly Media Inc, 2004.
|
[10] |
SMALLEY S, CRAIG R. Security Enhanced (SE) Android: Bringing Flexible MAC to Android[C]//NDSS. The Network and Distributed System Security Symposium 2013, February 24-27, 2013,San Diego, California. San Diego: ISOC, 2013: 20-38.
|
[11] |
MERLO A, COSTA G, VERDERAME L, et al.Android vs. SEAndroid: An empirical assessment[J]. Pervasive & Mobile Computing, 2016, 30:113-131.
|
[12] |
李桂芝,韩臻,周启惠,等. 基于Binder信息流的Android恶意行为检测系统[J]. 信息网络安全,2016(2):54-59.
|
[13] |
杨中皇, 董伦铭. 基于SE Android结合远程控制提升移动系统安全性[J]. 西安邮电大学学报, 2016, 21(5):1-10.
|
[14] |
BERTRAND A, David R., AKIMOV A, JUNK P. Remote administration tool for android devices[EB/OL] , 2016-5-1.
|
[15] |
HEARY J, WOLAND A.State of Play Report BYOD, CYOD, BYOT, BYOA and MORE[J]. ITNOW, 2014, 56:56-57.
|
[16] |
M/T 0003—2012 SM2椭圆曲线公钥密码算法[S]. 北京:中国标准出版社, 2012.
|