-
Notifications
You must be signed in to change notification settings - Fork 3
/
Copy paththesis.bib
88 lines (80 loc) · 3.06 KB
/
thesis.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
@phdthesis{Reference2,
Abstract = {We present a review of the use of diode lasers in atomic physics with an extensive list of references. We discuss the relevant characteristics of diode lasers and explain how to purchase and use them. We also review the various techniques that have been used to control and narrow the spectral outputs of diode lasers. Finally we present a number of examples illustrating the use of diode lasers in atomic physics experiments. Review of Scientific Instruments is copyrighted by The American Institute of Physics.},
Author = {Carl E. Wieman and Leo Hollberg},
Journal = {Review of Scientific Instruments},
Keywords = {Diode Laser},
Month = {1},
Number = {1},
Numpages = {20},
Pages = {1--20},
Title = {Using Diode Lasers for Atomic Physics},
Volume = {62},
Url = {http://link.aip.org/link/?RSI/62/1/1},
Year = {1991}}
@misc{gplaycli,
author = {matlink},
title = {Google Play Downloader via Command line},
howpublished = {Github Repository},
month = 2,
year = 2018,
note = {Tools}
}
@article{wang2018detecting,
title={Detecting android malware leveraging text semantics of network flows},
author={Wang, Shanshan and Yan, Qiben and Chen, Zhenxiang and Yang, Bo and Zhao, Chuan and Conti, Mauro},
journal={IEEE Transactions on Information Forensics and Security},
volume={13},
number={5},
pages={1096--1109},
year={2018},
publisher={IEEE}
}
@article{wang2018research,
title={Research on data mining of permissions mode for Android malware detection},
author={Wang, Chao and Xu, Qingzhen and Lin, Xiuli and Liu, Shouqiang},
journal={Cluster Computing},
pages={1--14},
year={2018},
publisher={Springer}
}
@article{melis2018explaining,
title={Explaining Black-box Android Malware Detection},
author={Melis, Marco and Maiorca, Davide and Biggio, Battista and Giacinto, Giorgio and Roli, Fabio},
journal={arXiv preprint arXiv:1803.03544},
year={2018}
}
@inproceedings{pranata2012determining,
title={Determining trustworthiness and quality of mobile applications},
author={Pranata, Ilung and Athauda, Rukshan and Skinner, Geoff},
booktitle={International Conference on Mobile Wireless Middleware, Operating Systems, and Applications},
pages={192--206},
year={2012},
organization={Springer}
}
@article{zhu2015discovery,
title={Discovery of ranking fraud for mobile apps},
author={Zhu, Hengshu and Xiong, Hui and Ge, Yong and Chen, Enhong},
journal={IEEE Transactions on knowledge and data engineering},
volume={27},
number={1},
pages={74--87},
year={2015},
publisher={IEEE}
}
@incollection{halamka2018privacy,
title={Privacy and Security},
author={Halamka, John D},
booktitle={Key Advances in Clinical Informatics},
pages={79--86},
year={2018},
publisher={Elsevier}
}
@inproceedings{zhou2012hey,
title={Hey, you, get off of my market: detecting malicious apps in official and alternative android markets.},
author={Zhou, Yajin and Wang, Zhi and Zhou, Wu and Jiang, Xuxian},
booktitle={NDSS},
volume={25},
number={4},
pages={50--52},
year={2012}
}