Author of the publication

Access Control for Plugins in Cordova-Based Hybrid Applications.

, , and . AINA, page 1063-1069. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing a Secure Programming Language.. Handbook of Information and Communication Security, Springer, (2010)Clustering versus SVM for malware detection., , , , and . J. Comput. Virol. Hacking Tech., 12 (4): 213-224 (2016)Dueling hidden Markov models for virus analysis., , , , and . J. Comput. Virol. Hacking Tech., 11 (2): 103-118 (2015)Support vector machines and malware detection., , , , and . J. Comput. Virol. Hacking Tech., 12 (4): 203-212 (2016)Clustering for malware classification., , , , and . J. Comput. Virol. Hacking Tech., 13 (2): 95-107 (2017)Efficient purely-dynamic information flow analysis., and . PLAS, page 113-124. ACM, (2009)Ping-Pong Governance: Token Locking for Enabling Blockchain Self-governance., , , and . MARBLE, page 13-29. Springer, (2019)Autocorrelation Analysis of Financial Botnet Traffic., , , and . ICISSP, page 599-606. SciTePress, (2018)Advanced transcriptase for JavaScript malware., , , and . MALWARE, page 121-128. IEEE Computer Society, (2016)TontineCoin: Murder-Based Proof-of-Stake., , , and . DAPPS, page 82-87. IEEE, (2020)