Author of the publication

Effective Risk Communication for Android Apps.

, , , and . IEEE Trans. Dependable Secur. Comput., 11 (3): 252-265 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generating Summary Risk Scores for Mobile Applications., , , , , , , and . IEEE Trans. Dependable Secur. Comput., 11 (3): 238-251 (2014)Automatic Application Identification from Billions of Files., , , and . KDD, page 2021-2030. ACM, (2017)CodeShield: towards personalized application whitelisting., , , and . ACSAC, page 279-288. ACM, (2012)Effective Risk Communication for Android Apps., , , and . IEEE Trans. Dependable Secur. Comput., 11 (3): 252-265 (2014)Large-Scale Identification of Malicious Singleton Files., , , and . CODASPY, page 227-238. ACM, (2017)Android permissions: a perspective combining risks and benefits., , , , , and . SACMAT, page 13-22. ACM, (2012)Dimensions of Risk in Mobile Applications: A User Study., , , , , and . CODASPY, page 49-60. ACM, (2015)Using probabilistic generative models for ranking risks of Android apps., , , , , , , and . CCS, page 241-252. ACM, (2012)Estimating Asset Sensitivity by Profiling Users., , and . ESORICS, volume 8134 of Lecture Notes in Computer Science, page 94-110. Springer, (2013)Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users., , , , , and . ESORICS (2), volume 9327 of Lecture Notes in Computer Science, page 396-414. Springer, (2015)