Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Smartphone App Identification Via Encrypted Network Traffic Analysis., , , and . CoRR, (2017)Mitigating black hole attacks in wireless sensor networks using node-resident expert systems., and . WTS, page 1-7. IEEE, (2014)There are many apps for that: quantifying the availability of privacy-preserving apps., , and . WISEC, page 247-252. ACM, (2017)To Update or Not to Update: Insights From a Two-Year Study of Android App Evolution., and . AsiaCCS, page 45-57. ACM, (2017)A Longitudinal Study of App Permission Usage across the Google Play Store., and . CoRR, (2016)SecuRank: Starving Permission-Hungry Apps Using Contextual Permission Analysis., and . SPSM@CCS, page 43-52. ACM, (2016)DEMO: Starving Permission-Hungry Android Apps Using SecuRank., and . ACM Conference on Computer and Communications Security, page 1850-1852. ACM, (2016)AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic., , , and . EuroS&P, page 439-454. IEEE, (2016)Short Paper: A Longitudinal Study of Financial Apps in the Google Play Store., and . Financial Cryptography, volume 10322 of Lecture Notes in Computer Science, page 302-309. Springer, (2017)Intra-Library Collusion: A Potential Privacy Nightmare on Smartphones., , and . CoRR, (2017)