Author of the publication

Towards Large-Scale Hunting for Android Negative-Day Malware.

, , , , and . RAID, page 533-545. USENIX Association, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network., , and . IJSN, 2 (3/4): 202-215 (2007)Sensor Code Attestation., and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Anonymous Routing., and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)An Algorithm for Jammer Localization in Wireless Sensor Networks., , and . AINA, page 724-731. IEEE Computer Society, (2012)Multi-objective software assignment for active cyber defense., , and . CNS, page 299-307. IEEE, (2015)Permlyzer: Analyzing permission usage in Android applications., , and . ISSRE, page 400-410. IEEE Computer Society, (2013)A Feasibility Study on Defending Against Ultra-Fast TopologicalWorms., and . Peer-to-Peer Computing, page 61-70. IEEE Computer Society, (2007)Zigzag: Partial mutual revocation based trust management in tactical ad hoc networks., , , , and . SECON, page 131-139. IEEE, (2013)Detecting Remote Exploits Using Data Mining., , , , , and . IFIP Int. Conf. Digital Forensics, volume 285 of IFIP, page 177-189. Springer, (2008)Practical Broadcast Authentication in Sensor Networks., , , and . MobiQuitous, page 118-132. IEEE Computer Society, (2005)