Author of the publication

Challenges in emulating sensor and resource-based state changes for Android malware detection.

, , , , and . ICSPCS, page 1-10. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Challenges in emulating sensor and resource-based state changes for Android malware detection., , , , and . ICSPCS, page 1-10. IEEE, (2015)A Program for Education in Certification and Accreditation., , , , and . World Conference on Information Security Education, volume 253 of IFIP Conference Proceedings, page 131-149. Kluwer, (2003)Formal Model of a Trusted File Server., and . S&P, page 157-166. IEEE Computer Society, (1989)A security and usability perspective of cloud file systems., , , and . SoSE, page 161-166. IEEE, (2011)Mobile Konami Codes: Analysis of Android Malware Services Utilizing Sensor and Resource-Based State Changes., , , , and . HICSS, page 5578-5587. IEEE Computer Society, (2016)Multinet Gateway-Towards A1 Certification., , , and . S&P, page 226. IEEE Computer Society, (1984)MYSEA Technology Demonstration., , , , and . DISCEX (2), page 10-12. IEEE Computer Society, (2003)Monterey Security Enhanced Architecture Project., , , , and . DISCEX (2), page 176-181. IEEE Computer Society, (2003)Open Questions in Formal Methods., , and . Computer, 53 (5): 81-84 (2020)Can You Trust Zero Trust?, , , and . Computer, 55 (8): 103-105 (2022)