Personensuche
X
?
Science of Cyber Security; Lecture Notes in Computer Science ,
5
ACDroid: Detecting Collusion Applications on Smart Devices:
, In:
?
Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses ,
7
BinProv: Binary Code Provenance Identification without Disa..:
, In:
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
8
Consistency is All I Ask: Attacks and Countermeasures on th..:
, In:
?
Information and Communications Security; Lecture Notes in Computer Science ,
10
UBER: Combating Sandbox Evasion via User Behavior Emulators:
, In:
?
Machine Learning for Cyber Security; Lecture Notes in Computer Science ,
11
Compositional Information Flow Verification for Inter Appli..:
, In:
?
Machine Learning for Cyber Security; Lecture Notes in Computer Science ,
12
CatraDroid: A Call Trace Driven Detection of Malicious Beha..:
, In:
?
2019 International Conference on Networking and Network Applications (NaNA) ,
15