Author of the publication

MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version).

, , , , , and . ACM Trans. Priv. Secur., 22 (2): 14:1-14:34 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Online annotation and prediction for regime switching data streams., , and . SAC, page 1501-1505. ACM, (2009)Privacy-friendly mobility analytics using aggregate location data., , and . SIGSPATIAL/GIS, page 34:1-34:10. ACM, (2016)MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)., , , , , and . ACM Trans. Priv. Secur., 22 (2): 14:1-14:34 (2019)Enhanced Photoacoustic Visualisation of Clinical Needles by Combining Interstitial and Extracorporeal Illumination of Elastomeric Nanocomposite Coatings., , , , , , , , , and . Sensors, 22 (17): 6417 (2022)Nonparametric Monitoring of Data Streams for Changes in Location and Scale., , and . Technometrics, 53 (4): 379-389 (2011)Inference for ETAS models with non-Poissonian mainshock arrival times., and . Stat. Comput., 29 (5): 915-931 (2019)What's Your Major Threat? On the Differences between the Network Behavior of Targeted and Commodity Malware., , , and . ARES, page 599-608. IEEE Computer Society, (2016)Did Mary Shelley write Frankenstein? A stylometric analysis., and . Digit. Scholarsh. Humanit., 38 (2): 750-765 (May 2023)Sequential monitoring of a Bernoulli sequence when the pre-change parameter is unknown., , and . Comput. Stat., 28 (2): 463-479 (2013)Erratum to "Exponentially weighted moving average charts for detecting concept drift" Pattern Recognition Lett. 33(2) (2012) 191-198., , , and . Pattern Recognit. Lett., 33 (16): 2261 (2012)