Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/compsac/AllixJBKST14
%A Allix, Kevin
%A Jérome, Quentin
%A Bissyandé, Tegawendé F.
%A Klein, Jacques
%A State, Radu
%A Traon, Yves Le
%B COMPSAC
%D 2014
%I IEEE Computer Society
%K
%P 384-393
%T A Forensic Analysis of Android Malware - How is Malware Written and How it Could Be Detected?
%U http://dblp.uni-trier.de/db/conf/compsac/compsac2014.html#AllixJBKST14
%@ 978-1-4799-3575-8
@inproceedings{conf/compsac/AllixJBKST14,
added-at = {2023-12-12T23:46:51.000+0100},
author = {Allix, Kevin and Jérome, Quentin and Bissyandé, Tegawendé F. and Klein, Jacques and State, Radu and Traon, Yves Le},
biburl = {https://www.bibsonomy.org/bibtex/2ad9a957b1d3ede523e2b96cfec0a84ad/admin},
booktitle = {COMPSAC},
crossref = {conf/compsac/2014},
ee = {http://doi.ieeecomputersociety.org/10.1109/COMPSAC.2014.61},
interhash = {5a2648b3338ec87f17235c5eb12c549f},
intrahash = {ad9a957b1d3ede523e2b96cfec0a84ad},
isbn = {978-1-4799-3575-8},
keywords = {},
pages = {384-393},
publisher = {IEEE Computer Society},
timestamp = {2023-12-12T23:46:51.000+0100},
title = {A Forensic Analysis of Android Malware - How is Malware Written and How it Could Be Detected?},
url = {http://dblp.uni-trier.de/db/conf/compsac/compsac2014.html#AllixJBKST14},
year = 2014
}