Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/icete/BoileauGPFM16a
%A Boileau, Catherine
%A Gagnon, François
%A Poisson, Jérémie
%A Frenette, Simon
%A Mejri, Mohamed
%B ICETE (Selected Papers)
%D 2016
%E Obaidat, Mohammad S.
%I Springer
%K dblp
%P 48-71
%T Towards Understanding the Role of Execution Context for Observing Malicious Behavior in Android Malware.
%U http://dblp.uni-trier.de/db/conf/icete/icete2016.html#BoileauGPFM16a
%V 764
%@ 978-3-319-67876-4
@inproceedings{conf/icete/BoileauGPFM16a,
added-at = {2019-01-21T00:00:00.000+0100},
author = {Boileau, Catherine and Gagnon, François and Poisson, Jérémie and Frenette, Simon and Mejri, Mohamed},
biburl = {https://puma.ub.uni-stuttgart.de/bibtex/2d4d64044ce52a3f676cf1177b9f356e6/dblp},
booktitle = {ICETE (Selected Papers)},
crossref = {conf/icete/2016s},
editor = {Obaidat, Mohammad S.},
ee = {https://doi.org/10.1007/978-3-319-67876-4_3},
interhash = {1221224e28655896c9856e38a43b2ee6},
intrahash = {d4d64044ce52a3f676cf1177b9f356e6},
isbn = {978-3-319-67876-4},
keywords = {dblp},
pages = {48-71},
publisher = {Springer},
series = {Communications in Computer and Information Science},
timestamp = {2019-09-27T17:43:09.000+0200},
title = {Towards Understanding the Role of Execution Context for Observing Malicious Behavior in Android Malware.},
url = {http://dblp.uni-trier.de/db/conf/icete/icete2016.html#BoileauGPFM16a},
volume = 764,
year = 2016
}