[1]
J. Chen, M. Fan, Signatures extraction method based on classification of malicious software, Journal of Computer Applications vol. 31 Suppl. 1, pp.83-85, (2011).
Google Scholar
[2]
NetQin mobile phone security report on May 2011, NetQin Inc., (2011).
Google Scholar
[3]
Operator guide to mobile malware, GSM Assoiction Offical Document SG19, Dec, (2008).
Google Scholar
[4]
Remote Mobile Malware Removal Study, GSM Assoiction Offical Document GSON6, May, (2011).
Google Scholar
[5]
The Mobile device security patching, GSM Assoiction Offical Document SG26, Apr, (2012).
Google Scholar
[6]
360 security center, URL: http: /www. 360. cn.
Google Scholar
[7]
Authorization Framework for Network APIs, Version 1. 0, Open Mobile Allianc, OMA-ER-Autho4API-V1_0, URL: http: /www. openmobilealliance. org.
Google Scholar
[8]
NetQin security, URL: http: /cn. nq. com.
Google Scholar
[9]
Kingsoft handset bodyguard, URL: http: /m. ijinshan. com.
Google Scholar
[10]
ITU-T SG17: Security Group. URL: http: /www. itu. int/en/ITU-T/studygroups/2013-2016/17/Pages/default. aspx.
Google Scholar
[11]
Study of the mobile security threats and solutions, CCSA TC8 WG2 Offical Document, (2011).
Google Scholar
[12]
The mobile malicious software defense scheme, CCSA TC11 WG2 Offical Document, (2011).
Google Scholar
[13]
The information security technical requirements of mobile terminals, CCSA TC11 WG2 Offical Document, (2012).
Google Scholar
[14]
The OAuth 2. 0 Authorization Protocol, URL: https: /datatracker. ietf. org/doc/draft-ietf-oauth-v2.
Google Scholar
[15]
Rising security , URL: http: /www. rising. com. cn.
Google Scholar
[16]
Mobile spam report, Version 1. 0, Open Mobile Allianc, OMA-ER-SpamReport-V1_0, URL: http: /www. openmobilealliance. org.
Google Scholar