Author of the publication

The Usability of Metadata for Android Application Analysis.

, , , , , and . ICONIP (1), volume 9947 of Lecture Notes in Computer Science, page 546-554. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

UFO - Hidden Backdoor Discovery and Security Verification in IoT Device Firmware., , , and . ISSRE Workshops, page 18-23. IEEE Computer Society, (2018)SoliAudit: Smart Contract Vulnerability Assessment Based on Machine Learning and Fuzz Testing., , , and . IoTSMS, page 458-465. IEEE, (2019)Semi-supervised Trojan Nets Classification Using Anomaly Detection Based on SCOAP Features., , , , , and . ISCAS, page 2423-2427. IEEE, (2022)AOS: An optimized sandbox method used in behavior-based malware detection., , , , , and . ICMLC, page 404-409. IEEE, (2011)Design and Implement Binary Fuzzing Based on Libfuzzer., , , , and . DSC, page 1-2. IEEE, (2018)The Usability of Metadata for Android Application Analysis., , , , , and . ICONIP (1), volume 9947 of Lecture Notes in Computer Science, page 546-554. (2016)Memory forensics using virtual machine introspection for Malware analysis., , , and . DSC, page 518-519. IEEE, (2017)ICPFuzzer: proprietary communication protocol fuzzing by using machine learning and feedback strategies., , , and . Cybersecur., 4 (1): 28 (2021)Efficient and effective NIDS for cloud virtualization environment., , and . CloudCom, page 249-254. IEEE Computer Society, (2012)Android privacy., , , , and . ICMLC, page 1830-1837. IEEE, (2012)