From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Empirical Evaluation of the Android Security Framework., , и . SEC, том 405 из IFIP Advances in Information and Communication Technology, стр. 176-189. Springer, (2013)DIOXIN: runtime security policy enforcement of fog applications., , , и . Int. J. Grid Util. Comput., 12 (2): 126-138 (2021)ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection., , , и . CoRR, (2020)Gotta CAPTCHA 'Em All: A Survey of Twenty years of the Human-or-Computer Dilemma., , , , и . CoRR, (2021)LiDiTE: a Full-Fledged and Featherweight Digital Twin Framework., , , , и . CoRR, (2022)You can't always get what you want: towards user-controlled privacy on Android., , , , и . CoRR, (2021)Light up that Droid! On the Effectiveness of Static Analysis Features against App Obfuscation for Android Malware Detection., , , , , и . CoRR, (2023)A Fraud-Resilient Blockchain-Based Solution for Invoice Financing., , , , и . IEEE Trans. Engineering Management, 67 (4): 1086-1098 (2020)APPregator: A Large-Scale Platform for Mobile Security Analysis., , , и . ICTSS, том 12543 из Lecture Notes in Computer Science, стр. 73-88. Springer, (2020)Enabling Next-Generation Cyber Ranges with Mobile Security Components., , и . ICTSS, том 12543 из Lecture Notes in Computer Science, стр. 150-165. Springer, (2020)