Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Programming on Android: Best Practices for Security and Reliability.. SERE, page 1-2. IEEE, (2013)Identifying Proxy Nodes in a Tor Anonymization Circuit., , and . SITIS, page 633-639. IEEE Computer Society, (2008)PyTrigger: A System to Trigger & Extract User-Activated Malware Behavior., , , , and . ARES, page 92-101. IEEE Computer Society, (2013)FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware., , , , , and . USENIX Security Symposium, page 2379-2396. USENIX Association, (2020)Demystifying 5G Traffic Patterns with an Indoor RAN Measurement Campaign., , , and . GLOBECOM, page 1185-1190. IEEE, (2023)When a Tree Falls: Using Diversity in Ensemble Classifiers to Identify Evasion in Malware Detectors., and . NDSS, The Internet Society, (2016)Streaming and Unbalanced PSI from Function Secret Sharing., , , , , , , and . SCN, volume 13409 of Lecture Notes in Computer Science, page 564-587. Springer, (2022)CapMan: Capability-Based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET., , and . ICCCN, page 1-6. IEEE, (2011)NetGator: Malware Detection Using Program Interactive Challenges., , , and . DIMVA, volume 7591 of Lecture Notes in Computer Science, page 164-183. Springer, (2012)Return Value Predictability Profiles for Self-healing., , , , and . IWSEC, volume 5312 of Lecture Notes in Computer Science, page 152-166. Springer, (2008)