Author of the publication

Improving the Automatic Identification of Malicious Android Apps in Unofficial Stores through Logo Analysis.

, , , , , and . ICISSP, page 567-572. SciTePress, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security triage: A report of a lean security requirements methodology for cost-effective security analysis., , , , , and . EmpiRE, page 25-27. IEEE Computer Society, (2014)Improving the Automatic Identification of Malicious Android Apps in Unofficial Stores through Logo Analysis., , , , , and . ICISSP, page 567-572. SciTePress, (2017)Mobile App Security Analysis with the MAVeriC Static Analysis Module., , , , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 5 (4): 103-119 (2014)SAM: The Static Analysis Module of the MAVERIC Mobile App Security Verification Platform., , , , , , and . TACAS, volume 9035 of Lecture Notes in Computer Science, page 225-230. Springer, (2015)Security triage: an industrial case study on the effectiveness of a lean methodology to identify security requirements., , , , , and . ESEM, page 24:1-24:8. ACM, (2014)Enhancing Public Digital Identity System (SPID) to Prevent Information Leakage., , , and . EGOVIS, volume 9265 of Lecture Notes in Computer Science, page 57-70. Springer, (2015)Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module., , , , , , , and . MIST@CCS, page 41-49. ACM, (2015)Integrating a Framework for Discovering Alternative App Stores in a Mobile App Monitoring Platform., , , , and . NFMCP@PKDD/ECML, volume 10785 of Lecture Notes in Computer Science, page 107-121. Springer, (2017)