Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

R2BN: An Adaptive Model for Keystroke-Dynamics-Based Educational Level Classification., , , , and . IEEE Trans. Cybern., 50 (2): 525-535 (2020)Towards Lightweight URL-Based Phishing Detection., , and . Future Internet, 13 (6): 154 (2021)Exploring Adversarial Attacks and Defences for Fake Twitter Account Detection, , , and . Technologies, 8 (4): 64 (2020)Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT., , , , , and . CoRR, (2021)A Risk Assessment Method for Smartphones., , and . SEC, volume 376 of IFIP Advances in Information and Communication Technology, page 443-456. Springer, (2012)A Secure Smartphone Applications Roll-out Scheme., , , and . TrustBus, volume 6863 of Lecture Notes in Computer Science, page 49-61. Springer, (2011)Mobile Devices - A Phisher's Paradise., , , and . SECRYPT, page 79-87. SciTePress, (2014)Exploring the Adoption of Physical Security Controls in Smartphones., , , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 287-298. Springer, (2015)I Know What You Did Last Summer: New Persistent Tracking Mechanisms in the Wild., and . IEEE Access, (2018)On the Feasibility of Malware Attacks in Smartphone Platforms., , , and . ICETE (Selected Papers), volume 314 of Communications in Computer and Information Science, page 217-232. Springer, (2011)