Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Malicious Activity on Smartphones Using Sensor Measurements., , and . NSS, volume 9408 of Lecture Notes in Computer Science, page 475-487. Springer, (2015)Adversarial Robustness with Non-uniform Perturbations., , , and . NeurIPS, page 19147-19159. (2021)Towards synchronization of live virtual machines among mobile devices., and . HotMobile, page 13. ACM, (2013)Firenze: Model Evaluation Using Weak Signals., , , , and . CAMLIS, volume 3391 of CEUR Workshop Proceedings, page 30-51. CEUR-WS.org, (2022)Detecting Targeted Attacks By Multilayer Deception., , , , and . J. Cyber Secur. Mobil., 2 (2): 175-199 (2013)Triton: A Carrier-based Approach for Detecting and Mitigating Mobile Malware., , and . J. Cyber Secur. Mobil., 3 (2): 181-212 (2014)Traffic backfilling: subsidizing lunch for delay-tolerant applications in UMTS networks., , , , and . MobiHeld@SOSP, page 11:1-11:5. ACM, (2011)Safe Internet Browsing Using a Transparent Virtual Browser., and . CSCloud, page 423-432. IEEE Computer Society, (2015)Rootkits on smart phones: attacks, implications and opportunities., , , , and . HotMobile, page 49-54. ACM, (2010)Security versus energy tradeoffs in host-based mobile malware detection., , , , and . MobiSys, page 225-238. ACM, (2011)