研究文章
识别的主要研究领域和次要的研究主题Android恶意软件分析和使用救生设备检测领域
|
| 条款 |
Doc1 |
Doc2 |
Doc3 |
Doc4 |
Doc5 |
|
| 访问 |
0 |
0 |
0 |
0 |
1 |
| 品 |
1 |
1 |
1 |
1 |
1 |
| 日历 |
0 |
1 |
0 |
0 |
0 |
| 连接 |
0 |
0 |
1 |
0 |
0 |
| 联系 |
0 |
1 |
0 |
0 |
0 |
| 呆立 |
0 |
0 |
0 |
1 |
0 |
| 数据 |
0 |
1 |
0 |
1 |
0 |
| 德维克 |
2 |
0 |
0 |
0 |
0 |
| 确切的 |
0 |
0 |
1 |
0 |
0 |
| 找到 |
0 |
0 |
1 |
0 |
0 |
| Identifi |
1 |
0 |
0 |
0 |
0 |
| 就像 |
0 |
1 |
0 |
0 |
0 |
| 列表 |
0 |
1 |
0 |
0 |
0 |
| Locat |
0 |
0 |
1 |
0 |
0 |
| Malwar |
1 |
1 |
0 |
1 |
0 |
| Messag |
0 |
0 |
0 |
0 |
1 |
| 甜点 |
0 |
1 |
0 |
0 |
1 |
| 网络 |
0 |
0 |
1 |
0 |
0 |
| 数量 |
0 |
1 |
0 |
0 |
0 |
| 电话 |
0 |
1 |
0 |
0 |
0 |
| 读 |
1 |
0 |
0 |
0 |
0 |
| 记录 |
0 |
0 |
0 |
1 |
0 |
| 发送 |
0 |
0 |
0 |
1 |
0 |
| 服务器 |
0 |
0 |
0 |
1 |
0 |
| 塔 |
0 |
0 |
1 |
0 |
0 |
| 跟踪 |
1 |
0 |
1 |
0 |
0 |
| Uniqu |
1 |
0 |
0 |
0 |
0 |
| Usag |
0 |
0 |
0 |
1 |
0 |
| 用户 |
1 |
1 |
1 |
0 |
0 |
| 各种各样的 |
0 |
0 |
0 |
1 |
0 |
| 无线网络 |
0 |
0 |
1 |
0 |
0 |
|
|