Author of the publication

Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps.

, , , , , , and . LCN, page 381-384. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BotSSCL: Social Bot Detection with Self-Supervised Contrastive Learning., , , , and . CoRR, (2024)Privacy Preserving Release of Mobile Sensor Data., , , , , and . CoRR, (2022)Analysing Security and Privacy Threats in the Lockdown Periods of COVID-19 Pandemic: Twitter Dataset Case Study., , , and . CoRR, (2022)CRESCENT+: a self-protecting framework for reliable composite web service delivery., , , and . Iran J. Comput. Sci., 1 (2): 65-87 (2018)Assessment Criteria for Trust Models in Cloud Computing., , , , and . GreenCom/iThings/CPScom, page 254-261. IEEE, (2013)Towards Automatic Annotation and Detection of Fake News., , , , , and . LCN, page 1-9. IEEE, (2023)Tracking and Personalization., , and . Modern Socio-Technical Perspectives on Privacy, (2022)Touch and You're Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking., , , and . Proc. Priv. Enhancing Technol., 2018 (2): 122-142 (2018)Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading., , , , , and . ACM Trans. Priv. Secur., 23 (2): 8:1-8:27 (2020)A Review of Computer Vision Methods in Network Security., , and . IEEE Commun. Surv. Tutorials, 23 (3): 1838-1878 (2021)