From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Acquiring and Analyzing App Metrics for Effective Mobile Malware Detection., , , и . IWSPA@CODASPY, стр. 50-57. ACM, (2016)Ransomware Steals Your Phone. Formal Methods Rescue It., , , и . FORTE, том 9688 из Lecture Notes in Computer Science, стр. 212-221. Springer, (2016)Introducing Quality System in Small and Medium Enterprises: An Experience Report., , , , и . PROFES, том 3009 из Lecture Notes in Computer Science, стр. 131-145. Springer, (2004)An exploratory study on the evolution of Android malware quality., , , , и . Journal of Software: Evolution and Process, (2018)An HMM and structural entropy based detector for Android malware: An empirical study., , и . Comput. Secur., (2016)A family of experiments to validate metrics for software process models., , , , и . J. Syst. Softw., 77 (2): 113-129 (2005)Managing Trust in Social Networks., и . Inf. Secur. J. A Glob. Perspect., 21 (4): 206-215 (2012)Identifying Mobile Repackaged Applications through Formal Methods., , , , и . ICISSP, стр. 673-682. SciTePress, (2017)Talos: no more ransomware victims with formal methods., , , , и . Int. J. Inf. Sec., 17 (6): 719-738 (2018)GasMet: Profiling Gas Leaks in the Deployment of Solidity Smart Contracts., , , , и . CoRR, (2020)