Author of the publication

MalAware: Effective and Efficient Run-Time Mobile Malware Detector.

, , and . DASC/PiCom/DataCom/CyberSciTech, page 270-277. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Friend or a Foe? Detecting Malware using Memory and CPU Features., , and . SECRYPT, page 73-84. SciTePress, (2016)A general practitioner or a specialist for your infected smartphone?, , and . CoRR, (2015)Run-time selection of security algorithms for networked devices., and . Q2SWinet, page 92-96. ACM, (2009)A design methodology for HW/SW security protocols.. University of Milan, Italy, (2006)Time, accuracy and power consumption tradeoff in mobile malware detection systems., , and . Comput. Secur., (2019)IPSec Database Query Acceleration., , and . ICETE (Selected Papers), volume 23 of Communications in Computer and Information Science, page 188-200. Springer, (2007)Gradual adaptation of security for sensor networks., , and . WOWMOM, page 1-9. IEEE Computer Society, (2010)Time Series Kernel Similarities for Predicting Paroxysmal Atrial Fibrillation from ECGs., , , , and . IJCNN, page 1-8. IEEE, (2018)Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection., , , , and . FPS, volume 10723 of Lecture Notes in Computer Science, page 242-258. Springer, (2017)System policies for gradual tuning of security and workload in wireless sensor networks., , and . WTS, page 1-6. IEEE, (2011)