1.
OYSZDWNWAKMMSMNSP. A Survey of Evaluation Techniques for Android Anti-Malware using Transformation Attacks. IJRITCC [Internet]. 2015Nov.30 [cited 2024Jul.27];3(11):6215-9. Available from: https://ijritcc.org/index.php/ijritcc/article/view/5021