Personensuche
X
?
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security ,
1
C2Miner: Tricking IoT Malware into Revealing Live Command &..:
, In:
?
Proceedings of the 21st International Conference on Mining Software Repositories ,
2
Comparing Apples to Androids: Discovery, Retrieval, and Mat..:
, In:
?
Advances in Sustainability Science and Technology; Smart Learning Ecosystems as Engines of the Green and Digital Transition ,
4
A Case Study of Participatory Video as Teaching Digital Sto..:
, In:
?
Proceedings of the 16th European Workshop on System Security ,
5
Of Ahead Time: Evaluating Disassembly of Android Apps Compi..:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
6
IoTFlow: Inferring IoT Device Behavior at Scale through Sta..:
, In:
?
2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR) ,
8
Connecting the .dotfiles: Checked-In Secret Exposure with E..:
, In:
?
Introduction to Digital Humanism ,
11
The Threat of Surveillance and the Need for Privacy Protect..:
, In:
?
Passive and Active Measurement; Lecture Notes in Computer Science ,
12