From post

DroidTest: Testing Android Applications for Leakage of Private Information.

, и . ISC, том 7807 из Lecture Notes in Computer Science, стр. 341-353. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fast jamming detection in sensor networks., , , и . ICC, стр. 934-938. IEEE, (2012)Mitigating jamming attacks in wireless broadcast systems., , и . Wireless Networks, 19 (8): 1867-1880 (2013)Using Auxiliary Sensors for Pairwise Key Establishment in WSN., и . Networking, том 4479 из Lecture Notes in Computer Science, стр. 251-262. Springer, (2007)Using Auxiliary Sensors for Pairwise Key Establishment in WSN., и . ACM Trans. Embed. Comput. Syst., 11 (3): 59:1-59:31 (2012)Location Privacy in Sensor Networks Against a Global Eavesdropper., , и . ICNP, стр. 314-323. IEEE Computer Society, (2007)Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks., , и . WISEC, стр. 2-12. ACM, (2008)Efficient self-healing group key distribution with revocation capability., , и . ACM Conference on Computer and Communications Security, стр. 231-240. ACM, (2003)Attack-resistant location estimation in sensor networks., , и . IPSN, стр. 99-106. IEEE, (2005)Adaptive Jamming-Resistant Broadcast Systems with Partial Channel Sharing., и . ICDCS, стр. 428-437. IEEE Computer Society, (2010)Protecting Neighbor Discovery Against Node Compromises in Sensor Networks.. ICDCS, стр. 579-588. IEEE Computer Society, (2009)