Monter d'un niveau |
Barrera, D., Kayacic, H. G., Oorschot, P. C. , & Somayaji, A. (octobre 2010). A methodology for empirical analysis of permission-based security models and its application to android [Communication écrite]. 17th ACM Conference on Computer and Communications Security (CCS 2010), Chicago, Illinois. Lien externe
Calvet, J., Davis, C. R., Fernandez, J. M., Marion, J.-Y., St-Onge, P.-L., Guizani, W., Bureau, P.-M., & Somayaji, A. (décembre 2010). The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet [Communication écrite]. 26th Annual Computer Security Applications Conference, Austin, TX, USA. Lien externe