Author of the publication

DCDroid: automated detection of SSL/TLS certificate verification vulnerabilities in Android apps.

, , , and . ACM TUR-C, page 137:1-137:9. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From big data to knowledge: A spatio-temporal approach to malware detection., , , , and . Comput. Secur., (2018)Identifying Intrusion Infections via Probabilistic Inference on Bayesian Network., , , and . DIMVA, volume 9148 of Lecture Notes in Computer Science, page 307-326. Springer, (2015)DNS Tunnel Detection for Low Throughput Data Exfiltration via Time-Frequency Domain Analysis., , , , , , , , , and . ICC, page 2331-2337. IEEE, (2023)Secure and Fast Query Approach for High-Precision Multi-dimensional Satellite Remote Sensing Data., , , , , , and . EDGE, volume 14205 of Lecture Notes in Computer Science, page 69-81. Springer, (2023)Probabilistic Inference on Integrity for Access Behavior Based Malware Detection., , , and . RAID, volume 9404 of Lecture Notes in Computer Science, page 155-176. Springer, (2015)Centrality metrics of importance in access behaviors and malware detections., , , and . ACSAC, page 376-385. ACM, (2014)Understanding Effects of Collaborations in Developing Mobile Computing Systems: Popularity, Efficiency, and Quality., , , , , and . IEEE Access, (2019)Security importance assessment for system objects and malware detection., , , , and . Comput. Secur., (2017)Linking User Identities Across Social Networks via Frequency Domain Analysis., , and . IFIP Networking, page 1-8. IEEE, (2023)HMGR: A Hybrid Model for Geolocation Recommendation., , , , , and . BigData, volume 14203 of Lecture Notes in Computer Science, page 48-62. Springer, (2023)