Author of the publication

Work in progress: Real world relevant security labware for mobile threat analysis and protection experience.

, , , , and . FIE, page 1-2. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing Robustness of Neural Networks through Fourier Stabilization., , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 8880-8889. PMLR, (2021)A Collaborative Interactive Cyber-learning Platform for Anywhere Anytime Java Programming Learning., , , , and . ICALT, page 14-16. IEEE Computer Society, (2011)OVM: an ontology for vulnerability management., and . CSIIRW, page 34. ACM, (2009)The Emergence of Reproducibility and Consistency in Diffusion Models., , , , , , and . ICML, OpenReview.net, (2024)Mobile device based authentic learning for computer network and security., , , , and . ITiCSE, page 335. ACM, (2013)Enhancing the information assurance and security (IAS) in CS education with mobile-device based hands-on labs., , , , and . ITiCSE, page 343. ACM, (2014)A hybrid approach for mobile security threat analysis., , , , , and . WISEC, page 28:1-28:2. ACM, (2015)Security Data Mining in an Ontology for Vulnerability Management., and . IJCBS, page 597-603. IEEE Computer Society, (2009)Design of Online Runtime and Testing Environment for Instant Java Programming Assessment., , and . ITNG, page 1102-1106. IEEE Computer Society, (2010)Web Service-Enabled Spam Filtering with Naïve Bayes Classification., , , , , and . BigDataService, page 99-104. IEEE Computer Society, (2015)