institution logo
If you're member of the institution,  you just have to login to download the file in restricted access. It is not necessary to request a print.

Request copy

Comprehending Malicious Android Apps By Mining Topic-Specific Data Flow Signatures
Yang, Xinli; Lo, David; Li, Li et al.
2017In Information and Software Technology

Document(s) requested
yang2017characterizing.pdf

The desired document is not currently available on open access. Nevertheless you can request an offprint through the form below. If your request is accepted you will receive by e-mail a link allowing you access to the document for 5 days, 5 download attempts maximum.


Request form

Fields marked with ✱ are compulsory.

Back to the reference
Contact ORBilu