Author of the publication

Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation.

, , , , , and . CODASPY, page 139-141. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IntelliAV: Building an Effective On-Device Android Malware Detector., , and . CoRR, (2018)Reject option with multiple thresholds., , and . Pattern Recognit., 33 (12): 2099-2101 (2000)Special Issue ÄI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection"., and . Algorithms, 16 (7): 327 (July 2023)Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis., , and . IEEE Trans. Dependable Secur. Comput., 9 (5): 714-726 (2012)DLLMiner: structural mining for malware detection., , , , and . Secur. Commun. Networks, 8 (18): 3311-3322 (2015)Infinity-Norm Support Vector Machines Against Adversarial Label Contamination., , , , and . ITASEC, volume 1816 of CEUR Workshop Proceedings, page 106-115. CEUR-WS.org, (2017)Methods for Designing Multiple Classifier Systems., , and . Multiple Classifier Systems, volume 2096 of Lecture Notes in Computer Science, page 78-87. Springer, (2001)Network Intrusion Detection by Combining One-Class Classifiers., , and . ICIAP, volume 3617 of Lecture Notes in Computer Science, page 58-65. Springer, (2005)HMM-Web: A Framework for the Detection of Attacks Against Web Applications., , and . ICC, page 1-6. IEEE, (2009)Query Shifting Based on Bayesian Decision Theory for Content-Based Image Retrieval., and . SSPR/SPR, volume 2396 of Lecture Notes in Computer Science, page 607-616. Springer, (2002)