Author of the publication

Evaluating email's feasibility for botnet command and control.

, , , and . DSN, page 376-385. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

xAccess: A unified user-centric access control framework for web applications.. NOMS, page 530-533. IEEE, (2012)Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014., , , and . CoRR, (2014)Passive security intelligence to analyze the security risks of mobile/BYOD activities., , , , , , , , , and . IBM J. Res. Dev., 60 (4): 9 (2016)CASE: Comprehensive Application Security Enforcement on COTS Mobile Devices., , and . MobiSys, page 375-386. ACM, (2016)Practical out-of-band authentication for mobile applications., and . Middleware (Industry Track), page 3:1-3:6. ACM, (2013)Evaluating Bluetooth as a Medium for Botnet Command and Control., , , , and . DIMVA, volume 6201 of Lecture Notes in Computer Science, page 61-80. Springer, (2010)PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets., , , , , , and . WWW, page 594-604. ACM, (2019)Biometric authentication on a mobile device: a study of user effort, error and task disruption., , , , , and . ACSAC, page 159-168. ACM, (2012)Accurate and efficient reliability estimation techniques during ADL-driven embedded processor design., , , and . DATE, page 547-552. EDA Consortium San Jose, CA, USA / ACM DL, (2013)Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck., , , , , , and . USENIX Security Symposium, page 985-1002. USENIX Association, (2020)