Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

I Know What You Did Last Summer: New Persistent Tracking Mechanisms in the Wild., and . IEEE Access, (2018)On the Feasibility of Malware Attacks in Smartphone Platforms., , , and . ICETE (Selected Papers), volume 314 of Communications in Computer and Information Science, page 217-232. Springer, (2011)An Intensive Analysis of Security and Privacy Browser Add-Ons., , and . CRiSIS, volume 9572 of Lecture Notes in Computer Science, page 258-273. Springer, (2015)Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition., , , , and . SEC, volume 376 of IFIP Advances in Information and Communication Technology, page 249-260. Springer, (2012)Smartphone Security Evaluation - The Malware Attack Case ., , , and . SECRYPT, page 25-36. SciTePress, (2011)Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software., and . Comput. Secur., 31 (6): 802-803 (2012)Towards a Multi-Layered Phishing Detection., , and . Sensors, 20 (16): 4540 (2020)A Risk Assessment Method for Smartphones., , and . SEC, volume 376 of IFIP Advances in Information and Communication Technology, page 443-456. Springer, (2012)R2BN: An Adaptive Model for Keystroke-Dynamics-Based Educational Level Classification., , , , and . IEEE Trans. Cybern., 50 (2): 525-535 (2020)Exploring Adversarial Attacks and Defences for Fake Twitter Account Detection, , , and . Technologies, 8 (4): 64 (2020)