Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using social networks to harvest email addresses., , , , , and . WPES, page 11-20. ACM, (2010)Rage against the virtual machine: hindering dynamic analysis of Android malware., , , , and . EUROSEC, page 5:1-5:6. ACM, (2014)The Long-Standing Privacy Debate: Mobile Websites vs Mobile Apps., , , , , and . WWW, page 153-162. ACM, (2017)A Trusted Knowledge Management System for Multi-layer Threat Analysis., , , , and . TRUST, volume 8564 of Lecture Notes in Computer Science, page 214-215. Springer, (2014)Measurement, Modeling, and Analysis of the Mobile App Ecosystem., , , , and . ACM Trans. Model. Perform. Evaluation Comput. Syst., 2 (2): 7:1-7:33 (2017)MAD: A Middleware Framework for Multi-step Attack Detection., , , and . BADGERS@RAID, page 8-15. IEEE, (2015)Rise of the planet of the apps: a systematic study of the mobile app ecosystem., , , , and . Internet Measurement Conference, page 277-290. ACM, (2013)Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software., , , , and . DIMVA, volume 9148 of Lecture Notes in Computer Science, page 165-184. Springer, (2015)Two-factor authentication: is the world ready?: quantifying 2FA adoption., , , and . EUROSEC, page 4:1-4:7. ACM, (2015)A Systematic Characterization of IM Threats using Honeypots., , , and . NDSS, The Internet Society, (2010)