From post

A methodology for empirical analysis of permission-based security models and its application to android.

, , , и . ACM Conference on Computer and Communications Security, стр. 73-84. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Mercury: Recovering Forgotten Passwords Using Personal Devices., , , , и . Financial Cryptography, том 7035 из Lecture Notes in Computer Science, стр. 315-330. Springer, (2011)FiGD: An Open Source Intellectual Property Violation Detector., , и . SEKE, стр. 536-541. Knowledge Systems Institute Graduate School, (2009)SERENIoT: Collaborative Network Security Policy Management and Enforcement for Smart Homes., и . CoRR, (2020)Toward Identification and Characterization of IoT Software Update Practices., и . CoRR, (2022)If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes., , и . FPS, том 13877 из Lecture Notes in Computer Science, стр. 373-388. Springer, (2022)Microwave Photonics for Optical Fiber Sensors., , , и . OFC, стр. 1-3. IEEE, (2019)SERENIoT: Distributed Network Security Policy Management and Enforcement for Smart Homes., и . ACSAC, стр. 542-555. ACM, (2020)High order UWB pulses generation based on a scalable phase-to-intensity technique., , , , и . ECOC, стр. 1-3. IEEE, (2015)Multi-cavity Microwave Photonics devices built upon multicore fibres., , , , и . ICTON, стр. 1-4. IEEE, (2016)Multiplexing FBG sensors combining microwave photonics and phase modulation., , , и . ICTON, стр. 1-4. IEEE, (2017)