[1]
, O.Y.S.Z.D.W.N.W.A.K.M.M.S.M.N.S.P. 2015. A Survey of Evaluation Techniques for Android Anti-Malware using Transformation Attacks. International Journal on Recent and Innovation Trends in Computing and Communication. 3, 11 (Nov. 2015), 6215–6219. DOI:https://doi.org/10.17762/ijritcc.v3i11.5021.