Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Malicious Activity on Smartphones Using Sensor Measurements., , and . NSS, volume 9408 of Lecture Notes in Computer Science, page 475-487. Springer, (2015)Adversarial Robustness with Non-uniform Perturbations., , , and . NeurIPS, page 19147-19159. (2021)Detecting Targeted Attacks By Multilayer Deception., , , , and . J. Cyber Secur. Mobil., 2 (2): 175-199 (2013)Triton: A Carrier-based Approach for Detecting and Mitigating Mobile Malware., , and . J. Cyber Secur. Mobil., 3 (2): 181-212 (2014)Safe Internet Browsing Using a Transparent Virtual Browser., and . CSCloud, page 423-432. IEEE Computer Society, (2015)Traffic backfilling: subsidizing lunch for delay-tolerant applications in UMTS networks., , , , and . MobiHeld@SOSP, page 11:1-11:5. ACM, (2011)Towards synchronization of live virtual machines among mobile devices., and . HotMobile, page 13. ACM, (2013)Firenze: Model Evaluation Using Weak Signals., , , , and . CAMLIS, volume 3391 of CEUR Workshop Proceedings, page 30-51. CEUR-WS.org, (2022)Security versus energy tradeoffs in host-based mobile malware detection., , , , and . MobiSys, page 225-238. ACM, (2011)Rootkits on smart phones: attacks, implications and opportunities., , , , and . HotMobile, page 49-54. ACM, (2010)