Author of the publication

Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System.

, , , , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 379-390. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forensic analysis of wireless networking evidence of Android smartphones., , and . WIFS, page 109-114. IEEE, (2012)Studying users' adaptation to Android's run-time fine-grained access control system., , and . J. Inf. Secur. Appl., (2018)Impact of User Data Privacy Management Controls on Mobile Device Investigations., and . IFIP Int. Conf. Digital Forensics, volume 484 of IFIP Advances in Information and Communication Technology, page 89-105. Springer, (2016)Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method., , and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 115-126. Springer, (2014)Bu-Dash: A Universal and Dynamic Graphical Password Scheme., , and . HCI (32), volume 13333 of Lecture Notes in Computer Science, page 209-227. Springer, (2022)Optimizing Short Message Text Sentiment Analysis for Mobile Device Forensics., , , and . IFIP Int. Conf. Digital Forensics, volume 484 of IFIP Advances in Information and Communication Technology, page 69-87. Springer, (2016)Smartphone Message Sentiment Analysis., , and . IFIP Int. Conf. Digital Forensics, volume 433 of IFIP Advances in Information and Communication Technology, page 253-265. Springer, (2014)Messaging Activity Reconstruction with Sentiment Polarity Identification., and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 475-486. Springer, (2015)Permissions snapshots: Assessing users' adaptation to the Android runtime permission model., , and . WIFS, page 1-6. IEEE, (2016)To Allow, or Deny? That is the Question., and . HCI (30), volume 12210 of Lecture Notes in Computer Science, page 287-304. Springer, (2020)