From post

"Those things are written by lawyers, and programmers are reading that." Mapping the Communication Gap Between Software Developers and Privacy Experts.

, , , , , , и . Proc. Priv. Enhancing Technol., 2024 (1): 151-170 (января 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices., , , , и . CoRR, (2016)Malicious cryptocurrency miners: Status and Outlook., , , и . CoRR, (2019)Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices., , , и . IEEE Commun. Surv. Tutorials, 20 (1): 465-488 (2018)Less is More: A privacy-respecting Android malware classifier using federated learning., , и . Proc. Priv. Enhancing Technol., 2021 (4): 96-116 (2021)Instructions Unclear: Undefined Behaviour in Cellular Network Specifications., , , , , и . USENIX Security Symposium, стр. 3475-3492. USENIX Association, (2023)Feature Reduction to Speed Up Malware Classification., , и . NordSec, том 7161 из Lecture Notes in Computer Science, стр. 176-188. Springer, (2011)Android applications: Data leaks via advertising libraries., и . ISITA, стр. 314-317. IEEE, (2014)SoK: Systematic Classification of Side-Channel Attacks on Mobile Devices., , , и . CoRR, (2016)A Comparison of the Classification of Disparate Malware Collected in Different Time Periods., , , и . J. Networks, 7 (6): 946-955 (2012)Mining permission patterns for contrasting clean and malicious android applications., , и . Future Gener. Comput. Syst., (2014)