Author of the publication

Android Data Storage Locations and What App Developers Do with It from a Security and Privacy Perspective.

, , , and . ICISSP, page 378-387. SCITEPRESS, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating performance of long short-term memory recurrent neural networks on intrusion detection data., and . SAICSIT, page 218-224. ACM, (2013)Extracting salient features for network intrusion detection using machine learning methods., and . South Afr. Comput. J., (2014)From Dining Cryptographers to dining things: Unobservable communication in the IoT., and . CAMAD, page 1-7. IEEE, (2017)Android Data Storage Locations and What App Developers Do with It from a Security and Privacy Perspective., , , and . ICISSP, page 378-387. SCITEPRESS, (2022)ECDSA on Things: IoT Integrity Protection in Practise., , , and . ICICS, volume 9977 of Lecture Notes in Computer Science, page 3-17. Springer, (2016)Extracting Speech from Motion-Sensitive Sensors., and . DPM/CBT@ESORICS, volume 12484 of Lecture Notes in Computer Science, page 145-160. Springer, (2020)A Survey on Anonymous Communication Systems With a Focus on Dining Cryptographers Networks., , , and . IEEE Access, (2023)What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net., , and . J. Reliab. Intell. Environ., 5 (1): 41-64 (2019)A Survey on Anonymous Communication Systems with a Focus on Dining Cryptographers Networks., , , and . CoRR, (2022)Erstellung einer kollaborativen Arbeitsumgebung für die pandemiebedingte Online-Lehre - ein Praxisbericht., , , and . Inform. Spektrum, 45 (2): 106-114 (2022)