From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An exploratory study on the evolution of Android malware quality., , , , и . Journal of Software: Evolution and Process, (2018)Talos: no more ransomware victims with formal methods., , , , и . Int. J. Inf. Sec., 17 (6): 719-738 (2018)An HMM and structural entropy based detector for Android malware: An empirical study., , и . Comput. Secur., (2016)A family of experiments to validate metrics for software process models., , , , и . J. Syst. Softw., 77 (2): 113-129 (2005)Investigating the criticality of user-reported issues through their relations with app rating., , , и . J. Softw. Evol. Process., (2021)GasMet: Profiling Gas Leaks in the Deployment of Solidity Smart Contracts., , , , и . CoRR, (2020)Managing Trust in Social Networks., и . Inf. Secur. J. A Glob. Perspect., 21 (4): 206-215 (2012)Identifying Mobile Repackaged Applications through Formal Methods., , , , и . ICISSP, стр. 673-682. SciTePress, (2017)A Comparison of Static, Dynamic, and Hybrid Analysis for Malware Detection., , , , и . CoRR, (2022)Detection and robustness evaluation of android malware classifiers., , , , , , , , и . J. Comput. Virol. Hacking Tech., 18 (3): 147-170 (2022)