Author of the publication

MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes.

, , , and . FPS, volume 10128 of Lecture Notes in Computer Science, page 3-19. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy preserving data sharing and analysis for edge-based architectures., , , and . Int. J. Inf. Sec., 21 (1): 79-101 (2022)Exploiting If This Then That and Usage Control obligations for Smart Home security and management., , , , , and . Concurr. Comput. Pract. Exp., (2022)MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes., , , and . FPS, volume 10128 of Lecture Notes in Computer Science, page 3-19. Springer, (2016)A Distributed Usage Control Framework for Industrial Internet of Things., , , and . Security and Privacy Trends in the Industrial Internet of Thing, Springer, (2019)Digital Waste Disposal: an automated framework for analysis of spam emails., , , , , and . Int. J. Inf. Sec., 19 (5): 499-522 (2020)Pushing Forward Security in Network Slicing by Leveraging Continuous Usage Control., , , , , , , and . IEEE Communications Magazine, 58 (7): 65-71 (2020)Improving MQTT by Inclusion of Usage Control., , , , and . SpaCCS, volume 10656 of Lecture Notes in Computer Science, page 545-560. Springer, (2017)Using IFTTT to Express and Enforce UCON Obligations., , , , and . ISPEC, volume 11879 of Lecture Notes in Computer Science, page 213-231. Springer, (2019)DataPAL: Data Protection and Authorization Lifecycle framework., , , , , , and . SEEDA-CECNSM, page 1-8. IEEE, (2021)Enhancing Security in ETSI Open Source MANO with Usage Control Capability., , , , , , , and . IM, page 25-29. IFIP, (2019)