Author of the publication

Risk Assessment of User-Defined Security Configurations for Android Devices.

, , and . ISSRE, page 467-477. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Malicious SQL., , and . TrustBus, volume 4657 of Lecture Notes in Computer Science, page 259-268. Springer, (2007)Evaluating the Feasibility Issues of Data Confidentiality Solutions from a Data Warehousing Perspective., , and . DaWaK, volume 7448 of Lecture Notes in Computer Science, page 404-416. Springer, (2012)An Experimental Study of Software Aging and Rejuvenation in Dockerd., and . EDCC, page 1-6. IEEE, (2019)EDCC 2012 - Fast Abstracts & Student Forum Proceedings, and . CoRR, (2012)Penetration Testing for Web Services., and . Computer, 47 (2): 30-36 (2014)Benchmarking Untrustworthiness: An Alternative to Security Measurement., and . Int. J. Dependable Trust. Inf. Syst., 1 (2): 32-54 (2010)Deploying fault tolerant web service compositions., and . Comput. Syst. Sci. Eng., (2008)Editorial: Security and Dependability of Cloud Systems and Services - Part II., and . IEEE Trans. Serv. Comput., 10 (6): 927-928 (2017)NoSQL Databases: A Software Engineering Perspective., , , , and . WorldCIST (1), volume 353 of Advances in Intelligent Systems and Computing, page 741-750. Springer, (2015)An empirical study on combining diverse static analysis tools for web security vulnerabilities based on development scenarios., , , , , and . Computing, 101 (2): 161-185 (2019)